Sciweavers

1080 search results - page 192 / 216
» Modeling Constraint Programs with Software Technology Standa...
Sort
View
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
14 years 29 days ago
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host ...
Tommaso Cucinotta, Marco Di Natale, David Corcoran
CASSIS
2004
Springer
13 years 11 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
ISW
2009
Springer
14 years 2 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel
ASPLOS
2000
ACM
14 years 1 days ago
Power Aware Page Allocation
One of the major challenges of post-PC computing is the need to reduce energy consumption, thereby extending the lifetime of the batteries that power these mobile devices. Memory ...
Alvin R. Lebeck, Xiaobo Fan, Heng Zeng, Carla Schl...
ECOOP
2000
Springer
14 years 5 hour ago
Distributed Asynchronous Collections: Abstractions for Publish/Subscribe Interaction
ions for Publish/Subscribe Interaction Patrick Th. Eugster1 , Rachid Guerraoui1 , and Joe Sventek2 1 Swiss Federal Institute of Technology, Lausanne 2 Agilent Laboratories Scotland...
Patrick Th. Eugster, Rachid Guerraoui, Joe Sventek