palpitate 发表于 2025-3-28 16:09:52

There’s No Time, The Problem of Conceptualising Timehout his leading scientific role, which has been equally measured by his generous personality, hospitality, and kindness. Among the obtained results and mathematical solutions, the group is particularly fond of real-time abstractions, called Circle-Configurations, which provide a way of handling bot

Atheroma 发表于 2025-3-28 19:09:57

http://reply.papertrans.cn/59/5881/588071/588071_42.png

大量 发表于 2025-3-29 00:33:32

http://reply.papertrans.cn/59/5881/588071/588071_43.png

赞成你 发表于 2025-3-29 06:13:02

Formal Methods Analysis of the Secure Remote Password Protocold . protocol used in 1Password, iCloud Keychain, and other products. As with many PAKE protocols, two participants use knowledge of a pre-shared password to authenticate each other and establish a session key. SRP aims to resist dictionary attacks, not store plaintext-equivalent passwords on the ser

痴呆 发表于 2025-3-29 10:36:18

The Hitchhiker’s Guide to Decidability and Complexity of Equivalence Properties in Security Protocolapplied pi-calculus. We survey decidability and complexity results for the automated verification of such equivalences, casting existing results in a common framework which allows for a precise comparison. This unified view, beyond providing a clearer insight on the current state of the art, allowed

粗糙滥制 发表于 2025-3-29 12:33:44

http://reply.papertrans.cn/59/5881/588071/588071_46.png

繁荣地区 发表于 2025-3-29 16:41:13

Modelchecking Safety Properties in Randomized Security Protocolsre, however, a large class of protocols whose correctness relies on an explicit ability to model and reason about randomness. Although such protocols lie at the heart of many widely adopted systems for anonymous communication, they have so-far eluded automated verification techniques. We propose an

刺激 发表于 2025-3-29 21:19:55

Gender Bias in Neural Natural Language Processingify gender bias in a variety of neural NLP tasks. Our empirical evaluation with state-of-the-art neural coreference resolution and textbook RNN-based language models trained on benchmark data sets finds significant gender bias in how models view occupations. We then mitigate bias with .: a generic m

Overstate 发表于 2025-3-30 02:22:24

Formal Verification of Ethereum Smart Contracts Using Isabelle/HOLtion of assets, and digital identity verification..In this paper we propose a method for formal verification of Solidity smart contracts in Isabelle/HOL. We start from the imperative language and big-step semantics proposed by Schirmer [.], and adapt it to describe a rich subset of Solidity, impleme

Spinous-Process 发表于 2025-3-30 07:14:21

Formal Methods Analysis of the Secure Remote Password Protocole of any secrets. We do uncover one notable weakness of SRP, which follows from its design constraints. It is possible for a malicious server to fake an authentication session with a client, without the client’s participation. This action might facilitate an escalation of privilege attack, if the cl
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Logic, Language, and Security; Essays Dedicated to Vivek Nigam,Tajana Ban Kirigin,Mitsuhiro Okada Book 2020 Springer Nature Switzerland AG