Formalising Key-Distribution in the Presence of Trust using Object-Z
نویسنده
چکیده
منابع مشابه
-
In this paper a method for digitally recording four quarter-reference-wave-holograms (by CCD) in a Mach-Zehnder interferometer setup, and reconstructing the object wave-front by numerical method is presented. The terms of direct transmission, auto-correlation and conjugate wave in the four wave reconstruction are cancelled out and only one original object wave is left after overlapping. Reconst...
متن کاملA New Trust Model for B2C E-Commerce Based on 3D User Interfaces
Lack of trust is one of the key bottle necks in e-commerce development. Nowadays many advanced technologies are trying to address the trust issues in e-commerce. One among them suggests using suitable user interfaces. This paper investigates the functionality and capabilities of 3D graphical user interfaces in regard to trust building in the customers of next generation of B2C e-commerce websit...
متن کاملObject-z: a Speciication Language Advocated for the Description of Standards
The importance of formalising the speciication of standards has been recognised for a number of years. This paper advocates the use of the formal speciication language Object-Z in the deenition of standards. Object-Z is an extension to the Z language speciically to facilitate speciication in an object-oriented style. First, the syntax and semantics of Object-Z are described informally. Then the...
متن کاملObject-z: a Specification Language Advocated for the Description of Standards Object-z: a Speciication Language Advocated for the Description of Standards
The importance of formalising the speciication of standards has been recognised for a number of years. This paper advocates the use of the formal speciication language Object-Z in the deenition of standards. Object-Z is an extension to the Z language speciically to facilitate speciication in an object-oriented style. First, the syntax and semantics of Object-Z are described informally. Then the...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کامل