Sciweavers

1116 search results - page 78 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
DIM
2007
ACM
13 years 12 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
ESOP
2010
Springer
14 years 5 months ago
Amortized Resource Analysis with Polynomial Potential - A Static Inference of Polynomial Bounds for Functional Programs
In 2003, Hofmann and Jost introduced a type system that uses a potential-based amortized analysis to infer bounds on the resource consumption of (first-order) functional programs. ...
Jan Hoffmann and Martin Hofmann
ECMDAFA
2006
Springer
137views Hardware» more  ECMDAFA 2006»
13 years 11 months ago
A Canonical Scheme for Model Composition
There is little agreement on terminology in model composition, and even less on key characteristics of a model composition solution. We present three composition frameworks: the At...
Jean Bézivin, Salim Bouzitouna, Marcos Dido...
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
14 years 2 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
JUCS
2010
139views more  JUCS 2010»
13 years 2 months ago
Validating Modal Aspects of OntoUML Conceptual Models Using Automatically Generated Visual World Structures
: Assessing the quality of conceptual models is key to ensure that conceptual models can be used effectively as a basis for understanding, agreement and construction of information...
Alessander Botti Benevides, Giancarlo Guizzardi, B...