Sciweavers

1777 search results - page 222 / 356
» Programming Cryptographic Protocols
Sort
View
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
14 years 17 days ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui
CCS
2008
ACM
13 years 11 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
PADL
2009
Springer
14 years 9 months ago
Toward a Practical Module System for ACL2
Abstract. Boyer and Moore's ACL2 theorem prover combines firstorder applicative Common Lisp with a computational, first-order logic. While ACL2 has become popular and is being...
Carl Eastlund, Matthias Felleisen
ICRA
2008
IEEE
147views Robotics» more  ICRA 2008»
14 years 3 months ago
Automatic deployment and formation control of decentralized multi-agent networks
— Novel tools are needed to deploy multi-agent networks in applications that require a high degree of accuracy in the achievement and maintenance of geometric formations. This is...
Brian Stephen Smith, Magnus Egerstedt, Ayanna M. H...
SEUS
2008
IEEE
14 years 3 months ago
On Scalable Synchronization for Distributed Embedded Real-Time Systems
Abstract. We consider the problem of programming distributed embedded real-time systems with distributed dependencies. We show that the de facto standard of using locks and conditi...
Sherif Fadel Fahmy, Binoy Ravindran, E. Douglas Je...