Sciweavers

6348 search results - page 1179 / 1270
» A Lesson for Software Engineering from Knowledge Engineering
Sort
View
FSTTCS
2003
Springer
14 years 1 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
14 years 28 days ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
CODES
2002
IEEE
14 years 25 days ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
IPPS
2002
IEEE
14 years 24 days ago
Java Mirrors: Building Blocks for Remote Interaction
Java mirror objects are building blocks for integrating web-based with high performance applications. This paper demonstrates the utility of mirror objects for construction of rem...
Yuan Chen, Karsten Schwan, David W. Rosen
COMPSAC
2009
IEEE
14 years 17 days ago
Towards the Operational Semantics of User-Centric Communication Models
Abstract—The pervasiveness of complex communication services and the need for end-users to play a greater role in developing communication services have resulted in the creation ...
Yingbo Wang, Yali Wu, Andrew A. Allen, Barbara Esp...
« Prev « First page 1179 / 1270 Last » Next »