Sciweavers

4820 search results - page 53 / 964
» Implementing Signatures for C
Sort
View
CORR
2006
Springer
83views Education» more  CORR 2006»
13 years 7 months ago
Implementation and Deployment of a Distributed Network Topology Discovery Algorithm
Benoit Donnet, Bradley Huffaker, Timur Friedman, K...
ECEASST
2011
344views ECommerce» more  ECEASST 2011»
13 years 2 months ago
IBR-DTN: A lightweight, modular and highly portable Bundle Protocol implementation
Sebastian Schildt, Johannes Morgenroth, Wolf-Basti...
WOLLIC
2010
Springer
14 years 21 days ago
Reduction of the Intruder Deduction Problem into Equational Elementary Deduction for Electronic Purse Protocols with Blind Signa
Abstract. The intruder deduction problem for an electronic purse protocol with blind signatures is considered. The algebraic properties of the protocol are modeled by an equational...
Daniele Nantes Sobrinho, Mauricio Ayala-Rinc&oacut...
ISCA
2006
IEEE
142views Hardware» more  ISCA 2006»
14 years 1 months ago
Bulk Disambiguation of Speculative Threads in Multiprocessors
Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperat...
Luis Ceze, James Tuck, Josep Torrellas, Calin Casc...