Sciweavers

790 search results - page 57 / 158
» Designated Confirmer Signatures
Sort
View
CODES
2000
IEEE
14 years 19 days ago
On the roles of functions and objects in system specification
We present an analysis of the benefits and drawbacks of function and object based models in system specification. Functional models should be used for functional design space expl...
Axel Jantsch, Ingo Sander
ITC
2003
IEEE
92views Hardware» more  ITC 2003»
14 years 2 months ago
Infrastructure IP for Back-End Yield Improvement
The objective of this paper is to present an infrastructure IP (I-IP) designed to characterize yield loss in the process back-end. The I-IP structure is described in using a botto...
L. Forli, Jean Michel Portal, Didier Née, B...
EUROCRYPT
2001
Springer
14 years 1 months ago
Lower Bounds for Multicast Message Authentication
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Dan Boneh, Glenn Durfee, Matthew K. Franklin
NDSS
2000
IEEE
14 years 1 months ago
A Lightweight Tool for Detecting Web Server Attacks
We present an intrusion-detection tool aimed at protecting web servers, and justify why such a tool is needed. We describe several interesting features, such as the ability to run...
Magnus Almgren, Hervé Debar, Marc Dacier
ECOOP
2006
Springer
14 years 20 days ago
An Aspect-Oriented Adaptation Framework for Dynamic Component Evolution
This paper briefly describes the design of a dynamic adaptation management framework exploiting the concepts provided by Aspect-Oriented Software Development (AOSD) -in particular ...
Javier Cámara, Carlos Canal, Javier Cubo, J...