نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

Journal: :IACR Cryptology ePrint Archive 2009
Yong Yu Bo Yang Ying Sun Shenglin Zhu

Signcryption is a cryptographic primitive which performs encryption and signature in a single logical step with the cost lower than signature-then-encryption approach.. In this paper we gave attacks on confidentiality and unforgeability of two identity based signcryption schemes without random oracles. Further we proposed an improved identity based signcryption scheme without random oracles. We...

2009
Leonard Lensink César A. Muñoz Alwyn E. Goodloe

Declarative specifications of digital systems often contain parts that can be automatically translated into executable code. Automated code generation may reduce or eliminate the kinds of errors typically introduced through manual code writing. For this approach to be effective, the generated code should be reasonably efficient and, more importantly, verifiable. This paper presents a prototype ...

2001
Pao-Ann Hsiung Feng-Shi Su Chuen-Hau Gao Shu-Yu Cheng Yu-Ming Chang

Currently available application frameworks that target at the automatic design of real-time embedded software are poor in integrating functional and nonfunctional requirements for real-time embedded systems. In this work, we present the internal architecture and design flow of a newly proposed framework called Verifiable Embedded Real-Time Application Framework (VERTAF), which integrates three ...

2004
Pao-Ann Hsiung Shang-Wei Lin

Currently available application frameworks that target at the automatic design of real-time embedded software are poor in integrating functional and non-functional requirements. In this work, we reveal the internal architecture and design flow of a newly proposed framework called Verifiable Embedded Real-Time Application Framework (VERTAF), which integrates software component-based reuse, forma...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1390

this study compared the different effects of form-focused guided planning vs. meaning-focused guided planning on iranian pre-intermediate students’ task performance. the study lasted for three weeks and concentrated on eight english structures. forty five pre-intermediate iranian students were randomly assigned to three groups of guided planning focus-on-form group (gpfg), guided planning focus...

Journal: :Security and Communication Networks 2021

In the Big Data Era, outsourcing computation has become increasingly significant as it supplies resources for clients with limited resources. However, there are still many security challenges such payment fairness, privacy protection, and verification. this paper, we propose a secure publicly verifiable scheme large-scale matrix QR decomposition. proposed scheme, client can pay services through...

2005
Sudhindra Pandav Konrad Slind Ganesh Gopalakrishnan

We propose a heuristic-based method for discovering inductive invariants in the parameterized verification of safety properties. The promise of the method stems from powerful heuristics we have identified for verifying the cache coherence of directory based protocols. The heuristics are based on syntactic analysis of counterexamples generated during verification, combined with simple static ana...

پایان نامه :0 1375

to explore the idea the investingation proposed, aimed at finding whether the performances of the population of iranians students studying english in an efl context are consistent in l1 and l2 writing taks and whether there is a cross-linguistic transfer in this respect. in this regard the subjects were instructed to write four compositions-two in english and two in farsi-which consisted of an ...

پایان نامه :0 1374

the aim of this study has been to find answers for the following questions: 1. what is the effect of immediate correction on students pronunciation errors? 2. what would be the effect of teaching the more rgular patterns of english pronunciation? 3. is there any significant difference between the two methods of dealing with pronuciation errore, i. e., correction and the teaching of the regular ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1376

in chapter 1, charactrizations of fragmentability, which are obtained by namioka (37), ribarska (45) and kenderov-moors (32), are given. also the connection between fragmentability and its variants and other topics in banach spaces such as analytic space, the radone-nikodym property, differentiability of convex functions, kadec renorming are discussed. in chapter 2, we use game characterization...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید