Sciweavers

1801 search results - page 241 / 361
» Implementation-Oriented Secure Architectures
Sort
View
133
Voted
IICS
2003
Springer
15 years 9 months ago
Message-Oriented-Middleware in a Distributed Environment
Middleware technologies have been facilitating the communication between the distributed applications. Traditional messaging system’s are synchronous and have inherent weaknesses...
Sushant Goel, Hema Sharda, David Taniar
132
Voted
AINA
2010
IEEE
15 years 8 months ago
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems
Intelligent connected devices become a more vital part of our lives. In contrast to prior years, today embedded systems and devices are loosely coupled and cooperate with each oth...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
TOOLS
2000
IEEE
15 years 8 months ago
Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration
The success of distributed object technology, depends on the advent of Object Request Broker (ORB) architectures that are able to integrate flexible support for various nonfunctio...
Bo Nørregaard Jørgensen, Eddy Truyen...
139
Voted
CADE
2000
Springer
15 years 8 months ago
Machine Instruction Syntax and Semantics in Higher Order Logic
Abstract. Proof-carrying code and other applications in computer security require machine-checkable proofs of properties of machine-language programs. These in turn require axioms ...
Neophytos G. Michael, Andrew W. Appel
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
15 years 7 months ago
Implementing Cryptographic Pairings on Smartcards
Abstract. Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations...
Michael Scott, Neil Costigan, Wesam Abdulwahab