نتایج جستجو برای: practical proof

تعداد نتایج: 334168  

Journal: :IACR Cryptology ePrint Archive 2009
Dang Nguyen Duc Kwangjo Kim

In this paper, we propose a grouping-proof protocol for RFID tags based on secret sharing. Our proposed protocol addresses the scalability issue of the previous protocols by removing the need for an RFID reader to relay messages from one tag to another tag. We also present a security model for a secure grouping-proof protocol which properly addresses the so called mafia fraud atttack. Mafia fra...

2009
Philippe Dhaussy Pierre Yves Pillain Stephen Creff Amine Raji Yves Le Traon Benoit Baudry

A well known challenge in the formal methods domain is to improve their integration with practical engineering methods. In the context of embedded systems, model checking requires first to model the system to be validated, then to formalize the properties to be satisfied, and finally to describe the behavior of the environment. This last point which we name as the proof context is often neglect...

2008
Mira Belenkiy Melissa Chase Markulf Kohlweiss Anna Lysyanskaya

In this paper, we introduce P-signatures. A P-signature scheme consists of a signature scheme, a commitment scheme, and (1) an interactive protocol for obtaining a signature on a committed value; (2) a non-interactive proof system for proving that the contents of a commitment has been signed; (3) a noninteractive proof system for proving that a pair of commitments are commitments to the same va...

1998
Michael Nikolaou

After several years of efforts, constrained model predictive control (MPC), the de facto standard algorithm for advanced control in process industries, has finally succumbed to rigorous analysis. Yet successful practical implementations of MPC were already in place almost two decades before a rigorous stability proof for constrained MPC was published. What is then the importance of recent theor...

2000
Joachim J. Eggers Jonathan K. Su Bernd Girod

Blind digital watermarking is the communication of information via multimedia host data, where the unmodified host data is not available to the watermark detector. Many watermarking schemes suffer considerably from the remaining host-signal interference. For the additive white Gaussian case, Costa showed theoretically that interference from the host can be eliminated. However, the proof involve...

1999
Roberto Di Cosmo

The notion of isomorphisms of types has many theoretical as well as practical consequences, and isomorphisms of types have been investigated at length over the past years. Isomorphisms in weak system (like linear lambda calculus) have recently been investigated due to their practical interest in library search. In this paper we give a remarkably simple and elegant characterization of linear iso...

2012
Aina Niemetz Mathias Preiner Florian Lonsing Martina Seidl Armin Biere

A certificate of (un)satisfiability for a quantified Boolean formula (QBF) represents concrete assignments to the variables, which act as witnesses for its truth value. Certificates are highly requested for practical applications of QBF like formal verification and model checking. We present an integrated set of tools realizing resolution-based certificate extraction for QBF in prenex conjuncti...

1998
Gerard J. Holzmann

It has become good practice to expect authors of new model checking algorithms to provide not only rigorous evidence of the algorithms correctness, but also evidence of their practical signi cance. Though the rules for determining what is and what is not a good proof of correctness are clear, no comparable rules are usually enforced for determining the soundness of the data that is used to supp...

2009
Andrew McCreight

We present a comprehensive set of tactics that make it practical to use separation logic in a proof assistant. These tactics enable the verification of partial correctness properties of complex pointer-intensive programs. Our goal is to make separation logic as easy to use as the standard logic of a proof assistant. We have developed tactics for the simplification, rearranging, splitting, match...

1999
Alexander Bolotov Clare Dixon Michael Fisher

In this paper we consider proof techniques for branching-time temporal logics. While a considerable amount of research has been carried out regarding the relationship between finite automata and such logics, practical proof techniques for such logics have received relatively little attention. Recently, however, several applications requiring refined proof methods for branching-time temporal log...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید