Sciweavers

1116 search results - page 125 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
FSEN
2009
Springer
14 years 2 months ago
A Safe Implementation of Dynamic Overloading in Java-Like Languages
We present a general technique for extending Java-like languages with dynamic overloading, where method selection depends on the dynamic type of the parameter, instead of just the ...
Lorenzo Bettini, Sara Capecchi, Betti Venneri
OOIS
2000
Springer
13 years 11 months ago
Reconfigurability in Object Database Management Systems: An Aspect-Oriented Approach
ABSTRACT. Cost-effective reconfiguration in ODBMSs is difficult to achieve due to the tradeoff between modularity and efficiency. Existing ODBMS designs offer limited reconfigurabi...
Awais Rashid, Ruzanna Chitchyan
CC
2012
Springer
271views System Software» more  CC 2012»
12 years 3 months ago
Parallel Replication-Based Points-To Analysis
Pointer analysis is one of the most important static analyses during compilation. While several enhancements have been made to scale pointer analysis, the work on parallelizing the...
Sandeep Putta, Rupesh Nasre
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
14 years 1 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
ESORICS
2009
Springer
14 years 2 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...