نتایج جستجو برای: verification is not verifiable
تعداد نتایج: 7944505 فیلتر نتایج به سال:
The first edition of this paper appeared in TOPLAS 37(2) 7:1-7:31 (April 2015). It used notation compatible with the Verified Software Toolchain version 1.0, now obsolete. In this second edition there are no new scientific results, but the Verifiable C notation used corresponds to the VST 1.6 software currently in use, January 2016. Any differences between this version and the as-published TOPL...
Shuffling is an effective method to build a publicly verifiable mix network to implement verifiable anonymous channels that can be used for important cryptographic applications like electronic voting and electronic cash. One shuffling scheme by Groth is claimed to be secure and efficient. However, its soundness has not been formally proven. An attack against the soundness of this shuffling sche...
this study attempts to investigate the effect of peers’ revision in comparison to that of the teacher, and whether peers’ comments and teachers’ comments facilitate students’ revision? if yes, which one is more effective? also attempts have been made to see which aspects of language are more highlighted by peers versus teachers when commenting. besides, it is investigating the student’s attitud...
the present paper investigates how far ideologies can be tease out in discourse by examining the employed schemata by two ideologically opposed news media, the bbc and press tv, to report syria crisis during a period of nine months in 2011. by assuming that news is not a valuefree construction of facts and drawing on micro structural approach of schema theory, for the first time in discours...
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
Under the assumption that numbers of data that are encrypted and decrypted are sufficiently large and final decryption results of individual data can be publicly disclosed, a simplified mechanism for implementing reencryption type verifiable mix-nets is proposed. Different from already proposed mechanisms, in which mix-servers prove their honest encryptions while concealing their encryption par...
This work presents a novel approach for the verification of Behavioral UML models, by means of software model checking. We propose adopting software model checking techniques for verification of UML models. We translate UML to verifiable C code which preserves the high level structure of the models, and abstracts details that are not needed for verification. We combine of static analysis and bo...
Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate computations to more powerful servers, and to verify the correctness of results. Delegation and verification rely only on public parameters, and thus PVC lends itself to large multi-user systems where entities need not be registered. In such settings, individual user requirements may be diverse and cannot be realis...
This paper presents some proposals of protocols for two types of schemes such as verifiable delegation of computation and remote electronic voting, based on polynomial properties. Our protocols for verifiable delegation of computation are aimed to the efficient evaluation of polynomials, working on schemes where the polynomial and/or the input are kept secret to the server. Our proposal for rem...
In the research of searchable encryption, fine-grained data authorization is a convenient way to manage search rights for users. Recently, Liu et al. proposed scheme with verification, which can control and verify results. this paper, we first present forgery attack against al.’s then propose novel verifiable in edge environment. Based on key aggregate mechanism Merkle hash tree, our not only a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید