نتایج جستجو برای: aldin asad abadi

تعداد نتایج: 1078  

Journal: :Jurnal Curere 2022

The purpose of this study is to determine the level student satisfaction in SMP Cahaya Pengharapan Abadi Class VIII on daring PJOK learning Covid-19 Pandemic Era 2021. This type research a quantitative descriptive using survey methods. In study, questionnaire instruments were used for data collection, and statistics with percentages analysis. population was 28 students class Abadi. validity 0.7...

Journal: :IACR Cryptology ePrint Archive 2005
Gergei Bana

SOUNDNESS AND COMPLETENESS OF FORMAL LOGICS OF SYMMETRIC ENCRYPTION Gergei Bana Supervisor: Andre Scedrov In the last two decades, two major directions in cryptography have developed: formal and computational. The formal approach uses simple, manageable formal languages to describe cryptographic protocols; this approach is amenable to automatization, suitable for computer tools, but its accurac...

2000
Jon Howell David Kotz

We extend the logic and semantics of authorization due to Abadi, Lampson, et al. to support restricted delegation. Our formal model provides a simple interpretation for the variety of constructs in the Simple Public Key Infrastructure (SPKI), and lends intuition about possible extensions. We discuss both extensions that our semantics supports and extensions that it cautions against.

2001
Ugo de'Liguoro

We give a simple characterization of convergent terms in Abadi and Cardelli untyped Object Calculus (ς-calculus) via intersection types. We consider a λ-calculus with records and its intersection type assignment system. We prove that convergent λ-terms are characterized by their types. The characterization is then inherited by the object calculus via self-application interpretation.

Journal: :Sci. Comput. Program. 2008
Wim H. Hesselink

In recent years, we extended the theory of Abadi and Lamport (1991) on the existence of refinement mappings. The present paper gives an overview of several extensions of the theory and of a number of recent applications to practical verifications. It concludes with a sketch of the results on semantic completeness, and a discussion of the relationship between semantic completeness and methodolog...

2009
Yusuke Kawamoto Hideki Sakurada Masami Hagiya

Rerandomizing ciphertexts plays an important role in protecting privacy in security protocols such as mixnets. We investigate the relationship between formal and computational approaches to the analysis of the security protocols using a rerandomizable encryption scheme. We introduce a new method of dealing with composed randomnesses in an Abadi-Rogaway-style pattern, formalize a rerandomizable ...

1994
Qiwen Xu Antonio Cau Pierre Collette

Assumption{Commitment paradigms for speciication and veriication of concurrent programs have been proposed in the past. We show that two typical parallel composition rules for shared variable and message passing programs 8, 12] which hitherto required diierent formulations are instances of one general rule mainly inspired by Abadi & Lamport's composition theorem 1].

2010
Michael Anthony Smith

Hoare and He’s Unifying Theories of Programming (UTP) provides a rich model of programs as relational predicates. This theory is intended to provide a single framework in which any programming paradigms, languages, and features, can be modelled, compared and contrasted. The UTP already has models for several programming formalisms, such as imperative programming, higher-order programming (e.g. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید