ARTÍCULO
TITULO

Verifying the SET Registration Protocols

Bella    
G. Massacci    
F. Paulson    
L. C.    

Resumen

No disponible

 Artículos similares

       
 
Boris Melnikov,Aleksandra Melnikova     Pág. 1 - 11
In this paper, we return to the topic related to one important binary relation on the set of formal languages (considered primarily on the set of iterations of nonempty finite languages), i.e. the equivalence relation at infinity. First of all, we consid... ver más

 
Boris Melnikov,Aleksandra Melnikova     Pág. 1 - 11
In this paper, we return to the topic, related to one important binary relation on the set of formal languages (considered primarily on the set of iterations of nonempty finite languages), i.e. the equivalence relation at infinity. First of all, we consi... ver más

 
Boris Melnikov,Aleksandra Melnikova     Pág. 1 - 10
In this paper, we continue the topic related to the special binary relation on the set of formal languages (considered primarily on the set of iterations of non­empty finite languages); this is so called equivalence relation at infinity. We have formulat... ver más

 
Tao Zhou, Zengchuan Dong, Xiuxiu Chen and Qihua Ran    
In this study, a model was proposed based on the sustainable boundary approach, to provide decision support for reservoir ecological operation with the dynamic Bayesian network. The proposed model was developed in four steps: (1) calculating and verifyin... ver más
Revista: Water

 
Limin Shen, Hui Li, Hongyi Wang, Yihuan Wang, Jiayin Feng and Yuqing Jian    
On the Android platform, information leakage can use an application-layer privilege escalation attack composed of multi-app collusion. However, the detection effect of a single app that can construct privilege escalation attacks is not good. Furthermore,... ver más
Revista: Information