Sciweavers

1249 search results - page 98 / 250
» Limitations of the Even-Mansour Construction
Sort
View
EUROPKI
2004
Springer
14 years 3 months ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
SPIN
2004
Springer
14 years 3 months ago
Model-Driven Software Verification
Abstract. In the classic approach to logic model checking, software verification requires a manually constructed artifact (the model) to be written in the language that is accepted...
Gerard J. Holzmann, Rajeev Joshi
KCAP
2003
ACM
14 years 3 months ago
A generic library of problem solving methods for scheduling applications
In this paper we describe a generic library of problemsolving methods (PSMs) for scheduling applications. Although, some attempts have been made in the past at developing librarie...
Dnyanesh G. Rajpathak, Enrico Motta, Zdenek Zdr&aa...
HOTI
2002
IEEE
14 years 3 months ago
Distributed-and-Split Data-Control Extension to SCSI for Scalable Storage Area Networks
A “Storage-Area Network” (SAN) comprises computers (“Initiators”), storage “block devices” (“Targets”), and a Controller(s). Most SANs use the SCSI protocol over v...
Yitzhak Birk, Nafea Bishara
IDEAS
2002
IEEE
111views Database» more  IDEAS 2002»
14 years 3 months ago
Distributing CORBA views from an OODBMS
The need to distribute objects on the Internet and to offer views from databases has found a solution with the advent of CORBA. Most database management systems now offer CORBA in...
Eric Viara, Guy Vaysseix, Emmanuel Barillot