Sciweavers

626 search results - page 41 / 126
» Abstract Modularity
Sort
View
LPAR
2005
Springer
14 years 3 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
14 years 2 months ago
Phobos: A Front-End Approach to Extensible Compilers
Abstract. This paper describes a practical approach for implementing certain types of domain-specific languages with extensible compilers. Given a compiler with one or more front-...
Adam Granicz, Jason Hickey
HASE
2002
IEEE
14 years 2 months ago
An Approach to Specify and Test Component-Based Dependable Software
Components (in-house or pre-fabricated) are increasingly being used to reduce the cost of software development. Given that these components may not have not been developed with de...
Arshad Jhumka, Martin Hiller, Neeraj Suri
ECOOP
2010
Springer
14 years 2 months ago
Modules as Objects in Newspeak
Abstract. We describe support for modularity in Newspeak, a programming language descended from Smalltalk [33] and Self [69]. Like Self, all computation — even an object’s own ...
Gilad Bracha, Peter von der Ahé, Vassili By...
ESAS
2007
Springer
14 years 3 months ago
Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes
Abstract. In this article we present the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro contro...
Leif Uhsadel, Axel Poschmann, Christof Paar