Sciweavers

6167 search results - page 997 / 1234
» Can Refinement be Automated
Sort
View
WPES
2004
ACM
14 years 4 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
14 years 4 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
ATAL
2004
Springer
14 years 4 months ago
The SPARK Agent Framework
There is a need for agent systems that can scale to realworld applications, yet retain the clean semantic underpinning of more formal agent frameworks. We describe the SRI Procedu...
David N. Morley, Karen L. Myers
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
14 years 4 months ago
Improving the Security of Dual-Rail Circuits
Dual-rail encoding, return-to-spacer protocol and hazard-free logic can be used to resist differential power analysis attacks by making the power consumption independent of process...
Danil Sokolov, Julian Murphy, Alexandre V. Bystrov...
DEON
2004
Springer
14 years 4 months ago
Designing a Deontic Logic of Deadlines
This paper studies the logic of a dyadic modal operator for being obliged to meet a condition ρ before a condition δ becomes true. Starting from basic intuitions we arrive at a s...
Jan Broersen, Frank Dignum, Virginia Dignum, John-...