Review on<i>Modelling and Verification of Secure Exams</i>
نویسندگان
چکیده
The Model Curricula Subcommittee of the IEEE Computer Society Education Committee was formed some 16 months ago to develop an Society-sanctioned four-year curriculum in computer science and engineering be used by colleges ...
منابع مشابه
Secure location verification and determination
This document considers two different approaches dealing with secure location claims. The first protocol is called ECHO [1] and handles with the secure verification of a location via ultra-sound. The second procedure increases the robustness of location determination protocols like RADAR [2]. Those are using standard IEEE 802.11 equipment. The document gives an introduction, overview, analysis ...
متن کاملSecure and trusted white-box verification
Verification is the process of checking whether a product has been implemented according to its prescribed specifications. We study the case of a designer (the developer) that needs to verify its design by a third party (the verifier), by making publicly available a limited amount of information about the design, namely a diagram of interconnections between the different design components, but ...
متن کاملSecure mechanical verification of mutually recursive procedures
The veriication of programs that contain mutually recursive procedures is a diicult task, and one which has not been satisfactorily addressed in the literature. Published proof rules have been later discovered to be unsound. Veriication Condition Generator (VCG) tools have been eeective in partially automating the veriication of programs, but in the past these VCG tools have in general not them...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Formal Aspects of Computing
سال: 2022
ISSN: ['1433-299X', '0934-5043']
DOI: https://doi.org/10.1145/3545182