Sciweavers

2133 search results - page 267 / 427
» Implementation of a SystemC based Environment
Sort
View
FC
2000
Springer
83views Cryptology» more  FC 2000»
14 years 2 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
OHS
2000
Springer
14 years 1 months ago
Experiences with OHP and Issues for the Future
Abstract. The OHSWG has by now moved from specifications to running code. This is an important step, not only because this is the only way of maturing the specifications, but also ...
Niels Olof Bouvin
TYPES
1995
Springer
14 years 1 months ago
A Natural Deduction Approach to Dynamic Logic
Natural Deduction style presentations of program logics are useful in view of the implementation of such logics in interactive proof development environments, based on type theory,...
Furio Honsell, Marino Miculan
NOSSDAV
1991
Springer
14 years 1 months ago
The Real-Time Channel Administration Protocol
The Real-time Channel Administration Protocol (RCAP) provides control and administration services for the Tenet real-time protocol suite, a connection-oriented suite of network an...
Anindo Banerjea, Bruce A. Mah
SIGGRAPH
1987
ACM
14 years 1 months ago
Flocks, herds and schools: A distributed behavioral model
The aggregate motion of a flock of birds, a herd of land animals, or a school of fish is a beautiful and familiar part of the natural world. But this type of complex motion is rar...
Craig W. Reynolds