Results 11 to 20 of about 30,718 (224)
A recent case study from AWS by Chong et al. proposes an effective methodology for Bounded Model Checking in industry. In this paper, we report on a follow up case study that explores the methodology from the perspective of three research questions: (a) can proof artifacts be used across verification tools; (b) are there bugs in verified code; and (c ...
Siddharth Priya +5 more
openaire +2 more sources
The formalization of biological systems using computational modelling approaches as an alternative to mathematical-based methods has recently received much interest because computational models provide a deeper mechanistic understanding of biological systems.
Savas Konur +2 more
openaire +3 more sources
Verified Verifiers for Verifying Elections [PDF]
The security and trustworthiness of elections is critical to democracy; alas, securing elections is notoriously hard. Powerful cryptographic techniques for verifying the integrity of electronic voting have been developed and are in increasingly common use. The claimed security guarantees of most of these techniques have been formally proved.
Haines, Thomas Edmund +2 more
openaire +2 more sources
What proof do we prefer? Variants of verifiability in voting [PDF]
In this paper, we discuss one particular feature of Internet voting, verifiability, against the background of scientific literature and experiments in the Netherlands. In order to conceptually clarify what verifiability is about, we distinguish classical
Pieters, W.
core +9 more sources
G. Ryle. Unverifiability-by-Me / trans. from Engl. V. V. Ogleznev [PDF]
The paper presents an analysis of the notions of ‘verifiability-in-principle’ and ‘(un)verifiability-byme’. Based on the distinction between logical and causal possibility, it is shown that the pronoun ‘I’ is not a demonstrative symbol lacking any ...
V. V. Ogleznev
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Klein, Gerwin, Nipkow, Tobias
openaire +2 more sources
Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing
Cloud storage, one of the most attractive services offered by cloud computing, can provide users with boundless storage capacity. Thus, users can outsource their data to the cloud server for greatly saving local storage overhead.
Changsong Yang +3 more
doaj +1 more source
Verifying Controlled Components [PDF]
Recent work on combining CSP and B has provided ways of describing systems comprised of components described in both B (to express requirements on state) and CSP (to express interactive and controller behaviour). This approach is driven by the desire to exploit existing tool support for both CSP and B, and by the need for compositional proof techniques.
Schneider, Steve A., Treharne, Helen
openaire +3 more sources
SeVEP: Secure and Verifiable Electronic Polling System
Electronic polling systems promise benefits to voters such as accessibility and convenience that enable them to cast their votes at any time, from any Internet-connected computing device anywhere in the world.
Amna Qureshi +2 more
doaj +1 more source
In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the ...
Rui SUN, You-Liang TIAN
doaj +3 more sources

