Sciweavers

4820 search results - page 30 / 964
» Implementing Signatures for C
Sort
View
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
13 years 12 months ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman
ICSM
2009
IEEE
14 years 2 months ago
Using method stereotype distribution as a signature descriptor for software systems
Method stereotype distribution is used as a signature for software systems. The stereotype for each method is determined using a presented taxonomy. The counts of the different st...
Natalia Dragan, Michael L. Collard, Jonathan I. Ma...
BMCBI
2011
13 years 2 months ago
The dChip survival analysis module for microarray data
Background: Genome-wide expression signatures are emerging as potential marker for overall survival and disease recurrence risk as evidenced by recent commercialization of gene ex...
Samir B. Amin, Parantu K. Shah, Aimin Yan, Sophia ...
AOSD
2003
ACM
14 years 25 days ago
Aspect-oriented programming with Jiazzi
We present aspect-oriented programming in Jiazzi. Jiazzi enhances Java with separately compiled, externally-linked code modules called units. Besides making programming in Java ge...
Sean McDirmid, Wilson C. Hsieh
ACSAC
2004
IEEE
13 years 11 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong