System

Results: 641854



#Item
151Cryptocurrencies / Blockchains / Concurrent computing / Distributed computing / Alternative currencies / Computing / Decentralization / Cross-platform software / Ethereum / Lisk / RootStock / Smart contract

IOV: a Blockchain Communication System DecemberFebruary 2018 Antoine Herzoga , Serge Karim Ganemb , Isabella Dellc , and Florin Dzeladinid a ; b ; c ; d

Add to Reading List

Source URL: raw.githubusercontent.com

Language: English
152Cryptography / Public-key cryptography / Computational complexity theory / Zero-knowledge proof / Proof of knowledge / Commitment scheme / Non-interactive zero-knowledge proof / IP / Cryptographic protocol / NP / RSA / Zero knowledge

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn University of California, San Diego smeiklej@ cs.ucsd.edu

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-06-18 19:02:40
153Dynamical systems / Systems science / Systems theory / Differential equations / Control theory / Hybrid system / Metabolism / Ariadne / Verification / Nonlinear system / Coq / Coenzyme Q10

A Taylor Function Calculus for Hybrid System Analysis Validation in Coq P. Collins1

Add to Reading List

Source URL: www.lix.polytechnique.fr

Language: English - Date: 2010-07-23 02:52:18
154Formal methods / Theoretical computer science / Automation / Safety case / Embedded system / Electromagnetism / Computing / Carbon nanotubes / Electrical engineering

Investigating Safety of a Radiotherapy Machine Using System Models with Pluggable Checkers Stuart Pernsteiner1 , Calvin Loncaric1 , Emina Torlak1 , Zachary Tatlock1 , Xi Wang1 , Michael D. Ernst1 , and Jonathan Jacky2 1

Add to Reading List

Source URL: unsat.cs.washington.edu

Language: English - Date: 2018-08-21 17:45:06
155Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / E-commerce / Public key certificate / Blockchain / X.509 / Extended Validation Certificate / CA/Browser Forum / Certificate authority

TPL: A Validation System for Secure Peer-to-Peer Exchange Demian Brener tions Santiago Palladino tions

Add to Reading List

Source URL: tplprotocol.org

Language: English - Date: 2018-10-11 13:55:35
156Prevention / Security / Computing / Safety / Information technology management / ISO/IEC 27001 / Computer security / Information governance / Information security / ISO/IEC 27006 / ISO/IEC 27001 Lead Auditor

CERTIFICATE OF REGISTRATION Information Security Management System - ISO/IEC 27001:2013 The Certification Body of Schellman & Company, LLC hereby certifies that the following organization operates an Information Securit

Add to Reading List

Source URL: a.slack-edge.com

Language: English - Date: 2018-06-26 14:09:55
157Microcontrollers / Computer architecture / Computing / Embedded systems / Computer hardware / ARM architecture / Embedded microprocessors / STM32 / USB / Mbed / Firmware

Philip Levis (for Amit Levy) Platform Lab Retreat, June 8, 2018 Tock: A Secure Operating System for Microcontrollers

Add to Reading List

Source URL: platformlab.stanford.edu

Language: English - Date: 2018-06-18 15:29:50
158Travel / Hospitality industry / Human behavior / Travel technology / OpenTravel Alliance / Accessibility / Ergonomics / Transportation planning / Urban design / Westin Hotels & Resorts / Hotel / Marriott International

ICT 2018: A temporary note for screen reader users of the hotel booking system

Add to Reading List

Source URL: ictaccessibilitytesting.org

Language: English - Date: 2018-05-09 16:35:18
159Computing / Parallel computing / Computer programming / Software engineering / Data parallelism / Proteus / Implicit parallelism / Concurrent computing / Parallelism / Scala

SPECIFICATION AND DEVELOPMENT OF PARALLEL ALGORITHMS WITH THE PROTEUS SYSTEM ALLEN GOLDBERG, PETER MILLS, LARS NYLAND, JAN PRINS, JOHN REIF, AND JAMES RIELY Abstract. The Proteus language is a wide-spectrum parallel prog

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-08 19:03:00
160Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

Add to Reading List

Source URL: dominictarr.github.io

Language: English - Date: 2015-07-10 14:55:46
UPDATE