To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10374

Title

Security Extension for Bresson-Chevassut-Pointcheval's model

Author

Chunjie Cao, Jianfeng Ma, Sangjae Moon

Citation

Vol. 6  No. 1  pp. 184~191

Keywords

Provable security, Distributed computing, Formal model, Multicast security


Title

Timed Weak Simulation Verification and its application to Stepwise Refinement of Real-Time Software

Author

Satoshi Yamane

Citation

Vol. 6  No. 1  pp. 192~203

Keywords

Refinement Design Method, Real-Time Software, Timed Weak Simulation Relation, Verification, Real-Time Scheduling


Title

Architectures for Self-Healing Databases under Cyber Attacks

Author

Peng Liu, Jiwu Jing

Citation

Vol. 6  No. 1  pp. 204~216

Keywords

Self-Healing Databases, Cyber Security, Architectures


Title

1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encryption

Author

Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai

Citation

Vol. 6  No. 1  pp. 217~226

Keywords

Electronic voting, Privacy, Security, Ballot-cancellation, Cryptography


[1] ... [prev] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [next] ... [2594]