KeY

Known as: Key system 
The KeY tool is used in formal verification of Java programs. It accepts specifications written in the Java Modeling Language to Java source files… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
With the rapid development and application of the mobile Internet, huge amounts of user data are generated and collected every… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret keys: the size of keys in our… (More)
Is this relevant?
2014
2014
The KeY system offers a platform of software analysis tools for sequential Java. Foremost, this includes full functional… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 4
  • figure 6
Is this relevant?
2012
2012
We study how CPS technology can help improve freeway traffic by combining local car GPS positioning, traffic center control… (More)
  • table I
  • figure 1
  • figure 2
Is this relevant?
2012
2012
The problem of visual control of an autonomous indoor blimp is investigated in this chapter. Autonomous aerial vehicles have been… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Wireless power technology offers the promise of cutting the last cord, allowing users to seamlessly recharge mobile devices as… (More)
  • figure 1
  • figure 3
  • figure 2
  • table I
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
KeY is a tool that provides facilities for formal specification and verification of programs within a commercial platform for UML… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We propose a generalisation of Paillier’s probabilistic public key system, in which the expansion factor is reduced and which… (More)
  • figure 1
Is this relevant?
Highly Cited
1993
Highly Cited
1993
We describe public key cryptosystems and analyse the RSA cryptosystem, pointing out a weakness (already known) of the RSA system… (More)
Is this relevant?