Sciweavers

1895 search results - page 132 / 379
» Modular Functional Descriptions
Sort
View
STOC
2005
ACM
103views Algorithms» more  STOC 2005»
14 years 8 months ago
New and improved constructions of non-malleable cryptographic protocols
We present a new constant round protocol for non-malleable zero-knowledge. Using this protocol as a subroutine, we obtain a new constant-round protocol for non-malleable commitmen...
Rafael Pass, Alon Rosen
IEEEARES
2007
IEEE
14 years 2 months ago
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
Bogdan Groza
IEEEARES
2007
IEEE
14 years 2 months ago
AProSec: an Aspect for Programming Secure Web Applications
Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should tak...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...
MOMM
2009
ACM
163views Communications» more  MOMM 2009»
14 years 18 days ago
Aspect-oriented modeling of adaptive web applications with HiLA
Modeling adaptivity is a challenging task for two reasons: 1) adaptation is usually strongly interwoven with the general functionality of the web application, separation of concer...
Gefei Zhang
AMAST
1998
Springer
14 years 5 days ago
An Algebraic View of Program Composition
Abstract. We propose a general categorical setting for modeling program composition in which the call-by-value and call-by-name disciplines fit as special cases. Other notions of c...
Pietro Cenciarelli