Sciweavers

1818 search results - page 324 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
CSFW
2008
IEEE
14 years 3 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
FDL
2008
IEEE
14 years 3 months ago
Model-based Design Space Exploration for RTES with SysML and MARTE
The features of the emerging modeling languages for system design allow designers to build models of almost any kind of heterogeneous hardware-software systems, including Real Tim...
Marcello Mura, Luis Gabriel Murillo, Mauro Prevost...
ICALT
2008
IEEE
14 years 3 months ago
Encouraging Persons with Hearing Problem to Learn Sign Language by Internet Websites
Nowadays the Internet users are from different ages and groups. Disabled people are a group of the Internet users. Some websites are especially created for these people. One group...
Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza
ICDCS
2008
IEEE
14 years 3 months ago
MR-PDP: Multiple-Replica Provable Data Possession
Many storage systems rely on replication to increase the availability and durability of data on untrusted storage systems. At present, such storage systems provide no strong evide...
Reza Curtmola, Osama Khan, Randal C. Burns, Giusep...
SADFE
2008
IEEE
14 years 3 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....