Sciweavers

103 search results - page 14 / 21
» Asymmetric Concurrent Signatures
Sort
View
ICALP
2005
Springer
14 years 7 days ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi
IFM
2005
Springer
100views Formal Methods» more  IFM 2005»
14 years 6 days ago
Embedding the Stable Failures Model of CSP in PVS
We present an embedding of the stable failures model of CSP in the PVS theorem prover. Our work, extending a previous embedding of the traces model of CSP in [6], provides a platfo...
Kun Wei, James Heather
ITC
2003
IEEE
141views Hardware» more  ITC 2003»
13 years 12 months ago
Cost-Effective Approach for Reducing Soft Error Failure Rate in Logic Circuits
In this paper, a new paradigm for designing logic circuits with concurrent error detection (CED) is described. The key idea is to exploit the asymmetric soft error susceptibility ...
Kartik Mohanram, Nur A. Touba
MDM
2001
Springer
13 years 11 months ago
Quasi-consistency and Caching with Broadcast Disks
The challenges ensuing from the asymmetric communication capabilities of mobile environments have led to an increased interest in broadcast-based data dissemination. Among the conc...
Rashmi Srinivasa, Sang Hyuk Son
IPPS
2000
IEEE
13 years 11 months ago
Real-Time Transaction Processing Using Two-Stage Validation in Broadcast Disks
Conventional concurrency control protocols are inapplicable in mobile computing environments due to a number of constraints of wireless communications. In this paper, we design a p...
Kwok-Wa Lam, Victor C. S. Lee, Sang Hyuk Son