Search dblp for Publications

export results for "veri cation"

 download as .bib file

@article{DBLP:journals/iacr/0001P16,
  author    = {Qiang Tang and
               Balazs Pejo},
  title     = {Game-Theoretic Framework for Integrity Veri cation in Computation
               Outsourcing},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {639},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/639},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/0001P16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/shonan-reports/NakajimaTTY16,
  author    = {Shin Nakajima and
               Jean{-}Pierre Talpin and
               Masumi Toyoshima and
               Huafeng Yu},
  title     = {Architecture-Centric Modeling, Analysis, and Veri cation of Cyber-Physical
               Systems {(NII} Shonan Meeting 2016-5)},
  journal   = {{NII} Shonan Meet. Rep.},
  volume    = {2016},
  year      = {2016},
  url       = {http://shonan.nii.ac.jp/shonan/report/no-2016-5/},
  timestamp = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/shonan-reports/NakajimaTTY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siu/HammalMMBA14,
  author    = {Youcef Hammal and
               Quentin Monnet and
               Lynda Mokdad and
               Jalel Ben{-}Othman and
               Abdelli Abdelkrim},
  title     = {Timed automata based modeling and veri?cation of denial of service
               attacks in wireless sensor networks},
  journal   = {Stud. Inform. Univ.},
  volume    = {12},
  number    = {1},
  pages     = {1--46},
  year      = {2014},
  url       = {http://studia.complexica.net/index.php?option=com\_content\&view=article\&id=254\%3Atimed-automata-based-modeling-and-verication-of-denial-of-service-attacks-in-wireless-sensor-networks-pp1-46-\&catid=65\%3Anumber-1-\&Itemid=112},
  timestamp = {Wed, 25 Feb 2015 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/siu/HammalMMBA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-0745,
  author    = {Adrian Kent and
               Serge Massar and
               Jonathan Silman},
  title     = {Secure and Robust Transmission and Veri?cation of Unknown Quantum
               States in Minkowski Space},
  journal   = {CoRR},
  volume    = {abs/1208.0745},
  year      = {2012},
  url       = {http://arxiv.org/abs/1208.0745},
  archivePrefix = {arXiv},
  eprint    = {1208.0745},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1208-0745.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemirelVJ12,
  title     = {Efficient Mix-Net Veri cation by Proofs of Random Blocks},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2012},
  pages     = {16},
  year      = {2012},
  note      = {Withdrawn.},
  url       = {http://eprint.iacr.org/2012/016},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/DemirelVJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bams/Korohoda10,
  author    = {Przemyslaw Korohoda},
  title     = {Simulation Based Verifi cation of the Bayesian Approach in Single-Pool
               Hemodialysis Modelling},
  journal   = {Bio Algorithms Med Syst.},
  volume    = {6},
  number    = {12},
  pages     = {105--111},
  year      = {2010},
  timestamp = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/bams/Korohoda10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/ColbrySJ05,
  author    = {Dirk Colbry and
               George C. Stockman and
               Anil K. Jain},
  title     = {Detection of Anchor Points for 3D Face Veri.cation},
  booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR}
               Workshops 2005, San Diego, CA, USA, 21-23 September, 2005},
  pages     = {118},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {https://doi.org/10.1109/CVPR.2005.441},
  doi       = {10.1109/CVPR.2005.441},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/cvpr/ColbrySJ05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/ShekharKGE05,
  author    = {Namrata Shekhar and
               Priyank Kalla and
               Sivaram Gopalakrishnan and
               Florian Enescu},
  title     = {Exploiting Vanishing Polynomials for Equivalence Veri.cation of Fixed-Size
               Arithmetic Datapaths},
  booktitle = {23rd International Conference on Computer Design {(ICCD} 2005), 2-5
               October 2005, San Jose, CA, {USA}},
  pages     = {215--220},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {https://doi.org/10.1109/ICCD.2005.52},
  doi       = {10.1109/ICCD.2005.52},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/iccd/ShekharKGE05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entcs/BaldamusBFR04,
  author    = {Michael Baldamus and
               Jesper Bengtson and
               Gian Luigi Ferrari and
               Roberto Raggi},
  title     = {Web Services as a New Approach to Distributing and Coordinating Semantics-Based
               Veri cation Toolkits},
  journal   = {Electron. Notes Theor. Comput. Sci.},
  volume    = {105},
  pages     = {11--20},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.entcs.2004.02.024},
  doi       = {10.1016/j.entcs.2004.02.024},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/entcs/BaldamusBFR04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics