Sciweavers

739 search results - page 59 / 148
» A security framework for the analysis and design of software...
Sort
View
ISICT
2003
13 years 10 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
IJNSEC
2007
82views more  IJNSEC 2007»
13 years 8 months ago
On Software Implementation of Fast DDP-based Ciphers
Data-dependent (DD) permutations (DDP) are discussed as a cryptographic primitive for the design of fast hardware, firmware, and software encryption systems. DDP can be performed...
Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas...
GIL
2009
13 years 6 months ago
A Software Package for Managing and Evaluating DNA Sequence and Microsatellite Data
Abstract: We have surveyed three molecular biology labs in Germany and Vietnam to evaluate practical problems in the management of molecular genetics data. These labs are generatin...
Truong Van Chi Cong, Zhivko Duchev, Eildert Groene...
KBSE
2005
IEEE
14 years 2 months ago
Timna: a framework for automatically combining aspect mining analyses
To realize the benefits of Aspect Oriented Programming (AOP), developers must refactor active and legacy code bases into an AOP language. When refactoring, developers first need...
David Shepherd, Jeffrey Palm, Lori L. Pollock, Mar...
ICSE
2009
IEEE-ACM
14 years 9 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...