Sciweavers

286 search results - page 39 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
EDBTW
2010
Springer
14 years 2 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
CSMR
2007
IEEE
14 years 2 months ago
Online Construction of Dynamic Object Process Graphs
A dynamic object process graph is a view on the control flow graph from the perspective of a single object. It has been shown that such a graph can be a useful starting point for...
Jochen Quante
INFOCOM
2003
IEEE
14 years 28 days ago
Goodput Analysis of a Fluid Queue with Selective Discarding and a Responsive Bursty Source
Abstract— In this paper we analyse a feedback system consisting of a finite buffer fluid queue and a responsive source. The source alternates between silence periods and active...
Parijat Dube, Eitan Altman
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 7 months ago
Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols
ion for Epistemic Model Checking of Dining Cryptographers-based Protocols Omar I. Al-Bataineh and Ron van der Meyden School of Computer Science and Engineering, University of New S...
Omar I. Al-Bataineh, Ron van der Meyden
SEFM
2009
IEEE
14 years 2 months ago
Checkmate: A Generic Static Analyzer of Java Multithreaded Programs
—In this paper we present ¼heckmate, a generic static analyzer of Java multithreaded programs based on the interpretation theory. It supports all the most relevant features of J...
Pietro Ferrara