Results 11 to 20 of about 30,718 (224)

Verifying verified code

open access: yesInnovations in Systems and Software Engineering, 2021
A recent case study from AWS by Chong et al. proposes an effective methodology for Bounded Model Checking in industry. In this paper, we report on a follow up case study that explores the methodology from the perspective of three research questions: (a) can proof artifacts be used across verification tools; (b) are there bugs in verified code; and (c ...
Siddharth Priya   +5 more
openaire   +2 more sources

Verifiable biology

open access: yesJournal of The Royal Society Interface, 2022
The formalization of biological systems using computational modelling approaches as an alternative to mathematical-based methods has recently received much interest because computational models provide a deeper mechanistic understanding of biological systems.
Savas Konur   +2 more
openaire   +3 more sources

Verified Verifiers for Verifying Elections [PDF]

open access: yesProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
The security and trustworthiness of elections is critical to democracy; alas, securing elections is notoriously hard. Powerful cryptographic techniques for verifying the integrity of electronic voting have been developed and are in increasingly common use. The claimed security guarantees of most of these techniques have been formally proved.
Haines, Thomas Edmund   +2 more
openaire   +2 more sources

What proof do we prefer? Variants of verifiability in voting [PDF]

open access: yes, 2006
In this paper, we discuss one particular feature of Internet voting, verifiability, against the background of scientific literature and experiments in the Netherlands. In order to conceptually clarify what verifiability is about, we distinguish classical
Pieters, W.
core   +9 more sources

G. Ryle. Unverifiability-by-Me / trans. from Engl. V. V. Ogleznev [PDF]

open access: yesОмский научный вестник: Серия "Общество. История. Современность"
The paper presents an analysis of the notions of ‘verifiability-in-principle’ and ‘(un)verifiability-byme’. Based on the distinction between logical and causal possibility, it is shown that the pronoun ‘I’ is not a demonstrative symbol lacking any ...
V. V. Ogleznev
doaj   +1 more source

Verified bytecode verifiers

open access: yesTheoretical Computer Science, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Klein, Gerwin, Nipkow, Tobias
openaire   +2 more sources

Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing

open access: yesIEEE Access, 2020
Cloud storage, one of the most attractive services offered by cloud computing, can provide users with boundless storage capacity. Thus, users can outsource their data to the cloud server for greatly saving local storage overhead.
Changsong Yang   +3 more
doaj   +1 more source

Verifying Controlled Components [PDF]

open access: yes, 2004
Recent work on combining CSP and B has provided ways of describing systems comprised of components described in both B (to express requirements on state) and CSP (to express interactive and controller behaviour). This approach is driven by the desire to exploit existing tool support for both CSP and B, and by the need for compositional proof techniques.
Schneider, Steve A., Treharne, Helen
openaire   +3 more sources

SeVEP: Secure and Verifiable Electronic Polling System

open access: yesIEEE Access, 2019
Electronic polling systems promise benefits to voters such as accessibility and convenience that enable them to cast their votes at any time, from any Internet-connected computing device anywhere in the world.
Amna Qureshi   +2 more
doaj   +1 more source

Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme

open access: yes网络与信息安全学报, 2016
In view of the problem that users’ informations are leaked and tampered possiblely exists at service terminal in existing outsourcing cloud computing protocols,a secure efficient and verifiable outsourcing protocol about determinant computing in the ...
Rui SUN, You-Liang TIAN
doaj   +3 more sources

Home - About - Disclaimer - Privacy