Sciweavers

1236 search results - page 131 / 248
» Digital Library
Sort
View
APLAS
2010
ACM
15 years 2 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
ESORICS
2003
Springer
15 years 7 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
MTA
2011
203views Hardware» more  MTA 2011»
14 years 9 months ago
Interoperable digital rights management based on the MPEG Extensible Middleware
Abstract This paper describes an interoperable Digital Rights Management architecture promoted by the MPEG standardization group in its new standard known as MPEG-M or MPEG Extensi...
Víctor Rodríguez-Doncel, Jaime Delga...
OOPSLA
2007
Springer
15 years 8 months ago
DigitalAssets discoverer: automatic identification of reusable software components
DigitalAssets Discoverer is a tool that implements a group of indicators for automatic identification of software components that can be reused in the development of new applicati...
Eduardo Machado Gonçalves, Marcilio Silva O...
VAST
2004
ACM
15 years 8 months ago
iClay: Digitizing Cuneiform
Advances in digital technology for the graphic and textual representation of manuscripts have not, until recently, been applied to the worldʼs oldest manuscripts, cuneiform table...
Jonathan D. Cohen, Donald Duncan, Dean Snyder, Jer...