نتایج جستجو برای: mousa abadi
تعداد نتایج: 966 فیلتر نتایج به سال:
Abstract Recent studies show that the adoption of RME scenarios is still a matter concern for non-western countries ((Mousa et al., Journal Management Development 38:681–696, 2019), 2021a, 2021b). In this paper, we theoretically propose potential direction business schools in Egypt and other similar cultural context to implement through articulating main antecedents before after Covid-19. used ...
Along with the extensive prevalence of the network and the portable equipments, people can access network resources conveniently. The protection of participants’ privacy and data confidentiality is significant. Authentication mechanism is essential to assure the authenticity of all participants and forbid the illegal accessing. In this paper, we propose a robust remote authentication scheme wit...
In trying to use Abadi and Cardelli's object calculi as a foundation for a programming language the addition of algebraic data types arises naturally. This paper deenes such an extension, shows a motivating example, and explores the new calculi by establishing properties such as Church-Rosser, subject reduction and uniqueness of types.
We study an extension of the well-known Abadi-Rogaway logic with hashes. Previously, we have given a sound computational interpretation of this extension using Canetti’s oracle hashing. This paper extends Micciancio and Warinschi’s completeness result for the original logic to this setting.
The purpose of this study is to determine the level student satisfaction in SMP Cahaya Pengharapan Abadi Class VIII on daring PJOK learning Covid-19 Pandemic Era 2021. This type research a quantitative descriptive using survey methods. In study, questionnaire instruments were used for data collection, and statistics with percentages analysis. population was 28 students class Abadi. validity 0.7...
SOUNDNESS AND COMPLETENESS OF FORMAL LOGICS OF SYMMETRIC ENCRYPTION Gergei Bana Supervisor: Andre Scedrov In the last two decades, two major directions in cryptography have developed: formal and computational. The formal approach uses simple, manageable formal languages to describe cryptographic protocols; this approach is amenable to automatization, suitable for computer tools, but its accurac...
We extend the logic and semantics of authorization due to Abadi, Lampson, et al. to support restricted delegation. Our formal model provides a simple interpretation for the variety of constructs in the Simple Public Key Infrastructure (SPKI), and lends intuition about possible extensions. We discuss both extensions that our semantics supports and extensions that it cautions against.
We give a simple characterization of convergent terms in Abadi and Cardelli untyped Object Calculus (ς-calculus) via intersection types. We consider a λ-calculus with records and its intersection type assignment system. We prove that convergent λ-terms are characterized by their types. The characterization is then inherited by the object calculus via self-application interpretation.
In recent years, we extended the theory of Abadi and Lamport (1991) on the existence of refinement mappings. The present paper gives an overview of several extensions of the theory and of a number of recent applications to practical verifications. It concludes with a sketch of the results on semantic completeness, and a discussion of the relationship between semantic completeness and methodolog...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید