Sciweavers

1210 search results - page 204 / 242
» Secure Logic Synthesis
Sort
View
CHES
2000
Springer
75views Cryptology» more  CHES 2000»
14 years 2 months ago
A 155 Mbps Triple-DES Network Encryptor
The presented Triple-DES encryptor is a single-chip solution to encrypt network communication. It is optimized for throughput and fast switching between virtual connections like fo...
Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, ...
FOAL
2007
ACM
14 years 1 months ago
Requirement enforcement by transformation automata
The goal of this work is to treat safety and security policies as requirements to be composed in an aspectual style with a developing application. Policies can be expressed either...
Douglas R. Smith
JFP
2008
125views more  JFP 2008»
13 years 10 months ago
Types and trace effects of higher order programs
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher order programs. The...
Christian Skalka, Scott F. Smith, David Van Horn
ENTCS
2007
113views more  ENTCS 2007»
13 years 10 months ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb
EUSFLAT
2009
152views Fuzzy Logic» more  EUSFLAT 2009»
13 years 7 months ago
Fuzzy and PSO Based Algorithm for Driver's Behavior Modeling
The study of human behavior during driving is of primary importance for the improvement of drivers' security. This study is complex because of numerous situations in which the...
Sohrab Khanmohammadi, Mohammad Ali Tinati, Sehrane...