|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 786 occurrences of 511 keywords
|
|
|
Results
Found 3233 publication records. Showing 3233 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
92 | Helger Lipmaa |
Verifiable Homomorphic Oblivious Transfer and Private Equality Test. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
cryptographic auctions, verifiable oblivious transfer, verifiable private equality test, homomorphic encryption |
83 | Joseph K. Liu, Victor K. Wei, Duncan S. Wong |
Custodian-Hiding Verifiable Encryption. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
Publicly Verifiable, Anonymity, Verifiable Encryption |
83 | Sherman S. M. Chow |
Verifiable Pairing and Its Applications. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security |
72 | Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald |
A Fully Distributed Proactively Secure Threshold-Multisignature Scheme. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
threshold-multisignature, distributed-key management infrastructure, publicly verifiable distributed-key generation, publicly verifiable distributed-key update, publicly verifiable distributed-key redistribution, distributed systems, secret sharing, Security and protection, group-oriented cryptography |
65 | C. Andrew Neff |
A verifiable secret shuffle and its application to e-voting. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
honest-verifier, universal verifiability, verifiable mix, verifiable shuffle, zeroknowledge, permutation, electronic voting, mix-net, anonymous credentials |
65 | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa |
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
verifiable shuffles, Paillier public-key system, Privacy, mix-nets, formal security model |
56 | Yi Deng 0002, Dongdai Lin |
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
instance-dependent verifiable random functions, simultaneous resettability, zero knowledge |
56 | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa |
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Verifiable shuffles, Paillier public-key system, Privacy, Mix-nets, Formal security model |
56 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
An e-Lottery Scheme Using Verifiable Random Function. |
ICCSA (3) |
2005 |
DBLP DOI BibTeX RDF |
e-lottery, verifiable random function, applied cryptography |
56 | Anna Lysyanskaya |
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Unique signatures, verifiable random functions, application of groups with DH-DDH separation |
56 | Ran Canetti, Shai Halevi, Michael Steiner 0001 |
Hardness Amplification of Weakly Verifiable Puzzles. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai |
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
pre-distributed data, Verifiable secret sharing, multiparty protocols |
47 | Ari Juels, Jorge Guajardo |
RSA Key Generation with Verifiable Randomness. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation |
47 | Giuseppe Ateniese |
Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. |
CCS |
1999 |
DBLP DOI BibTeX RDF |
contract signing problem, digital signatures, public-key cryptography, fair exchange, proof of knowledge, verifiable encryption |
47 | Ian F. Blake, Aldar C.-F. Chan |
Conditionally Verifiable Signature. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu |
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Yevgeniy Dodis |
Efficient Construction of (Distributed) Verifiable Random Functions. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Ming-Deh A. Huang, Shang-Hua Teng |
A Universal Problem in Secure and Verifiable Distributed Computation. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
38 | Edoardo Biagioni, Yingfei Dong, Wesley Peterson, Kazuo Sugihara |
Practical distributed voter-verifiable secret ballot system. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
secret ballot, voter verifiable, end-to-end, voting systems |
38 | Andreas Gampe, Jeffery von Ronne, David Niedzielski, Kleanthis Psarris |
Speculative improvements to verifiable bounds check elimination. |
PPPJ |
2008 |
DBLP DOI BibTeX RDF |
SafeTSA, array bounds check elimination, verifiable annotations, Java, optimization, just-in-time compilation |
38 | Sheng Zhong 0002, Yang Richard Yang |
Verifiable Distributed Oblivious Transfer and Mobile Agent Security. |
Mob. Networks Appl. |
2006 |
DBLP DOI BibTeX RDF |
privacy, mobile agent, oblivious transfer, verifiable secret sharing |
38 | Sheng Zhong, Yang Richard Yang |
Verifiable distributed oblivious transfer and mobile agent security. |
DIALM-POMC |
2003 |
DBLP DOI BibTeX RDF |
resiliency to corruptions, secure mobile agents and mobile code, oblivious transfer, verifiable secret sharing |
38 | Xiaoming Yu, Yinghua Min |
Design of delay-verifiable combinational logic by adding extra inputs. |
Asian Test Symposium |
1997 |
DBLP DOI BibTeX RDF |
delay-verifiable combinational logic, delay testability, synthesis, combinational circuits, hardware overhead, temporal behavior |
38 | Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas |
Verifiable Rotation of Homomorphic Encryptions. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong |
Efficient Verifiable Ring Encryption for Ad Hoc Groups. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Qiong Li, Xiamu Niu, Zhifang Wang, Yuhua Jiao, Sheng-He Sun |
A Verifiable Fingerprint Vault Scheme. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Sangjin Kim, Heekuck Oh |
Fair Offline Payment Using Verifiable Encryption. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
A Voting System with Trusted Verifiable Services. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Trust, Security Protocols, Security Services |
38 | Jan Camenisch, Victor Shoup |
Practical Verifiable Encryption and Decryption of Discrete Logarithms. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl |
Asynchronous verifiable secret sharing and proactive cryptosystems. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
model, secret sharing, asynchronous, proactive |
38 | Jun-Bum Shin, Kwangsu Lee, Kyungah Shim |
New DSA-Verifiable Signcryption Schemes. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Ayako Maeda, Atsuko Miyaji, Mitsuru Tada |
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Berry Schoenmakers |
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
38 | Eiichiro Fujisaki, Tatsuaki Okamoto |
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Rosario Gennaro, Silvio Micali |
Verifiable Secret Sharing as Secure Computation. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
38 | Thomas Beth, Hans-Joachim Knobloch, Marcus Otten |
Verifiable Secret Sharing for Monotone Access Structures. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
36 | Christian Cachin |
An asynchronous protocol for distributed computation of RSA inverses and its applications. |
PODC |
2003 |
DBLP DOI BibTeX RDF |
verifiable random functions, Cryptography, Byzantine agreement, threshold signatures, verifiable secret sharing |
36 | E-yong Kim, Klara Nahrstedt, Li Xiao 0003, Kunsoo Park |
Identity-based registry for secure interdomain routing. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
authorized search, identity-based registry, verifiable search |
36 | Luciano Bononi, Carlo Tacconi |
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Secure Clustering and Routing, Statistically Unique and Cryptographically Verifiable Identifiers, Mobile Ad Hoc Networks, Intrusion Detection System |
35 | Wei Zhao, Changlu Lin, Dingfeng Ye |
Provably Secure Convertible Nominative Signature Scheme. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Nominative signature, Digital signature, Selectively, Universally, Convertible |
35 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 |
A Generic Construction for Universally-Convertible Undeniable Signatures. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Universally-Convertible, Provable Security, Undeniable Signature, Generic Construction |
35 | Willy Susilo, Fangguo Zhang, Yi Mu 0001 |
Privacy-Enhanced Internet Storage. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer |
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications. |
TrustBus |
2004 |
DBLP DOI BibTeX RDF |
Pay-per-view systems, multicast, electronic payments |
30 | Bo Sheng, Qun Li 0001 |
Verifiable Privacy-Preserving Sensor Network Storage for Range Query. |
IEEE Trans. Mob. Comput. |
2011 |
DBLP DOI BibTeX RDF |
verifiable reply, sensor networks, Privacy preserving, range query |
30 | Pei-Yu Lin, Chi-Shiang Chan |
A Verifiable and Recoverable Secret Image Sharing Mechanism. |
ISPA |
2011 |
DBLP DOI BibTeX RDF |
camouflage, magic matrix, secret sharing, reversible, verifiable |
30 | Cláudio T. Silva |
Applications of geometry and topology for quadrilateral meshprocessing and verifiable visualization. |
SCG |
2010 |
DBLP DOI BibTeX RDF |
quadrilateral mesh processing, verifiable visualization, visualization, computer graphics |
29 | David Niedzielski, Jeffery von Ronne, Andreas Gampe, Kleanthis Psarris |
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination. |
SAS |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Ke Zeng |
Access with Fast Batch Verifiable Anonymous Credentials. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
fine-grained revocation, pairing, batch verification, anonymous credential |
29 | Sebastian Fischmeister, Oleg Sokolsky, Insup Lee 0001 |
A Verifiable Language for Programming Real-Time Communication Schedules. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
Time division multiaccess, Scheduling, Real time systems, Networks, Software verification and validation |
29 | Christophe Tartary, Josef Pieprzyk, Huaxiong Wang |
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme |
29 | Minos N. Garofalakis, Joseph M. Hellerstein, Petros Maniatis |
Proof Sketches: Verifiable In-Network Aggregation. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Jun Furukawa 0001, Kazue Sako |
An Efficient Publicly Verifiable Mix-Net for Long Inputs. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Hybrid-mix, efficient, public verifiability, multiple encryption |
29 | Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan |
Round-Optimal and Efficient Verifiable Secret Sharing. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Qianhong Wu, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang |
Publicly Verifiable Auctions with Minimal Leakage. |
COMPSAC |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jun Furukawa 0001 |
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
29 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
Easy Verifiable Primitives and Practical Public Key Cryptosystems. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Jan Camenisch, Ivan Damgård |
Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Andrew A. Adams, Hanne Gottliebsen, Steve Linton, Ursula Martin |
VSDITLU: a verifiable symbolic definite integral table look-up. |
CADE |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Markus Stadler |
Publicly Verifiable Secret Sharing. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
29 | Mike Burmester |
Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
29 | Claude Crépeau |
Verifiable Disclosure of Secrets and Applications (Abstract). |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
27 | Jan Camenisch, Thomas Groß 0001, Thomas S. Heydt-Benjamin |
Rethinking accountable privacy supporting services: extended abstract. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
time capsule, privacy, cryptographic protocols, accountability, verifiable encryption, anonymous credential systems |
27 | Michael R. Clarkson, Stephen Chong, Andrew C. Myers |
Civitas: Toward a Secure Voting System. |
SP |
2008 |
DBLP DOI BibTeX RDF |
verifiable elections, voter registration, secure bulletin boards, cryptographic protocols, Electronic voting, coercion resistance |
27 | Luciano Bononi, Carlo Tacconi |
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Secure clustering and routing, Statistically unique and cryptographically verifiable identifiers, Mobile Ad Hoc and Vehicular Networks, Intrusion detection system |
27 | Sébastien Foulle, Steve A. Schneider, Jacques Traoré, Zhe Xia |
Threat Analysis of a Practical Voting Scheme with Receipts. |
VOTE-ID |
2007 |
DBLP DOI BibTeX RDF |
Voter verifiable, voting ducks, electronic voting, threat analysis |
27 | Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
Kleptographic Attacks on E-Voting Schemes. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
receipt voting, election integrity, verifiable pseudo-randomness, electronic voting, coercion, kleptography |
27 | Xiaojian Tian, Duncan S. Wong |
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
MT-authenticator, BCK-model, CK-model, Verifiable Encryption |
27 | Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
dynamic root of trust, self-check-summing code, software-based code attestation, verifiable code execution, rootkit detection |
27 | Joonsang Baek, Yuliang Zheng 0001 |
Identity-Based Threshold Signature Scheme from the Bilinear Pairings. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
Identity-based threshold signature, Generalized Bilinear Problem, Bilinear Pairing, Verifiable secret-sharing, Chosen message attack |
27 | Ueli M. Maurer |
Secure Multi-party Computation Made Simple. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
adversary structures, secret-sharing, Secure multi-party computation, verifiable secret-sharing |
27 | Pierre-Alain Fouque, Jacques Stern |
One Round Threshold Discrete-Log Key Generation without Private Channels. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
Threshold DLK Generation, Publicly Verifiable Encryption, Adaptive and Concurrent Adversary |
27 | Markus Jakobsson, David Pointcheval, Adam L. Young |
Secure Mobile Gambling. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
Merkle, publicly verifiable, robust, Fair, lightweight, gambling |
27 | Feng Bao 0001, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan |
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
provable security, fair exchange, multi-party protocol, verifiable encryption |
27 | Matthias Fitzi, Martin Hirt, Ueli M. Maurer |
Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Secure multi-party computation, threshold cryptography, unconditional security, verifiable secret sharing |
27 | S. Crepaux-Motte, Mireille Jacomino, Rene David |
An algebraic method for delay fault testing. |
VTS |
1996 |
DBLP DOI BibTeX RDF |
input values, output function, robustly testable fault, nonrobustly testable fault, weakly verifiable, fault diagnosis, logic testing, delays, timing, Markov processes, random testing, delay fault testing, state transition, input vectors, algebraic method |
27 | B. M. Subraya, Anshul Kumar, Shashi Kumar |
An HOL based framework for design of correct high level synthesizers. |
VLSI Design |
1995 |
DBLP DOI BibTeX RDF |
HOL based framework, high level synthesizer design, design correctness guarantee, verifiable templates, synthesis module correctness, formal verification, high level synthesis, modularity, formal logic, higher order logic, verification process, formal framework |
27 | Michael D. Schroeder, David D. Clark, Jerome H. Saltzer |
The Multics Kernel Design Project. |
SOSP |
1977 |
DBLP DOI BibTeX RDF |
Multics, Type extension, Verifiable systems, MULTICS, Security, Operating systems, Protection, Security kernel, Supervisors |
27 | Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Security Amplification for InteractiveCryptographic Primitives. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 |
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Bilinear Pairings, Undeniable Signatures, Short Signature, Convertible |
27 | Chik How Tan |
Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear map |
27 | Samir Chouali, Jacques Julliand, Pierre-Alain Masson, Françoise Bellegarde |
PLTL-partitioned model checking for reactive systems under fairness assumptions. |
ACM Trans. Embed. Comput. Syst. |
2005 |
DBLP DOI BibTeX RDF |
PLTL model checking, Refinement design, fairness assumptions, out-of-core model checking |
27 | Rui Zhang 0002, Hideki Imai |
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Hiroaki Kikuchi |
Oblivious Counter and Majority Protocol. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Ronald Cramer |
Introduction to Secure Computation. |
Lectures on Data Security |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Masahito Hayashi, Takeshi Koshiba |
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage. |
IEEE/ACM Trans. Netw. |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Pham Nhat Minh, Chiro Hiro, Khuong Nguyen-An |
Orand - A Fast, Publicly Verifiable, Scalable Decentralized Random Number Generator Based on Distributed Verifiable Random Functions. |
IUKM (2) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Tal Derei, Benjamin Aulenbach, Victor Carolino, Caleb Geren, Michael Kaufman, Jonathan Klein, Rishad Islam Shanto, Henry F. Korth |
Scaling Zero-Knowledge to Verifiable Databases. |
VDBS@SIGMOD |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Matt Luckcuck, Marie Farrell (eds.) |
Proceedings Fourth International Workshop on Formal Methods for Autonomous Systems (FMAS) and Fourth International Workshop on Automated and verifiable Software sYstem DEvelopment (ASYDE), FMAS/ASYDE@SEFM 2022, and Fourth International Workshop on Automated and verifiable Software sYstem DEvelopment (ASYDE)Berlin, Germany, 26th and 27th of September 2022. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Xiaojie Guo |
Fixing Issues and Achieving Maliciously Secure Verifiable Aggregation in "VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning". |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
23 | Abbass Madi |
Secure Machine Learning by means of Homomorphic Encryption and Verifiable Computing. (Apprentissage machine sécurisé à l'aide de chiffrement homomorphe et de calcul vérifiable). |
|
2022 |
RDF |
|
23 | Yi Yang 0034, Tom Holvoet |
Generating Safe Autonomous Decision-Making in ROS. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Matteo Tadiello, Elena Troubitsyna |
Verifying Safety of Behaviour Trees in Event-B. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Bernhard K. Aichernig, Edi Muskardin, Andrea Pferscher |
Active vs. Passive: A Comparison of Automata Learning Paradigms for Network Protocols. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Joe Collenette, Louise A. Dennis, Michael Fisher 0001 |
Advising Autonomous Cars about the Rules of the Road. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Maike Schwammberger, Verena Klös |
From Specification Models to Explanation Models: An Extraction and Refinement Process for Timed Automata. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Jordan Hamilton, Ioannis Stefanakos, Radu Calinescu, Javier Cámara |
Towards Adaptive Planning of Assistive-care Robot Tasks. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Gricel Vázquez, Radu Calinescu, Javier Cámara |
Scheduling of Missions with Constrained Tasks for Heterogeneous Robot Systems. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Dominik Grundt, Anna Köhne, Ishan Saxena, Ralf Stemmer, Bernd Westphal, Eike Möhlmann |
Towards Runtime Monitoring of Complex System Requirements for Autonomous Driving Functions. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Rafael C. Cardoso 0001, Angelo Ferrando 0001, Michael Fisher 0001 |
Extending Attack-Fault Trees with Runtime Verification. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Predrag Filipovikj, Gustav Ung, Dilian Gurov, Mattias Nyberg |
Bounded Invariant Checking for Stateflow. |
FMAS/ASYDE@SEFM |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3233 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|