Sciweavers

1777 search results - page 290 / 356
» Programming Cryptographic Protocols
Sort
View
BIRTHDAY
2009
Springer
14 years 1 months ago
Pervasive Theory of Memory
For many aspects of memory theoretical treatment already exists, in particular for: simple cache construction, store buers and store buer forwarding, cache coherence protocols, o...
Ulan Degenbaev, Wolfgang J. Paul, Norbert Schirmer
FMSP
2000
ACM
152views Formal Methods» more  FMSP 2000»
14 years 1 months ago
Fault origin adjudication
When a program P fails to satisfy a requirement R supposedly ensured by a detailed speci cation S that was used to implement P, there is a question about whether the problem arise...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
14 years 1 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
UIST
1999
ACM
14 years 1 months ago
Implementing Phicons: Combining Computer Vision with InfraRed Technology for Interactive Physical Icons
This paper describes a novel physical icon [3] or “phicon-” based system that can be programmed to issue a range of commands about what the user wishes to do with handdrawn wh...
Darnell J. Moore, Roy Want, Beverly L. Harrison, A...
ICSE
1994
IEEE-ACM
14 years 24 days ago
Formalizing Architectural Connection
As software systems become more complex the overall system structure { or software architecture { becomes a central design problem. An important step towards an engineering discip...
Robert J. Allen, David Garlan