Sciweavers

6555 search results - page 1228 / 1311
» Secure attribute-based systems
Sort
View
ISCAPDCS
2001
13 years 11 months ago
Tolerating Transient Faults through an Instruction Reissue Mechanism
In this paper, we propose a fault-tolerant mechanism for microprocessors, which detects transient faults and recovers from them. There are two driving force to investigate fault-t...
Toshinori Sato, Itsujiro Arita
MASCOTS
2001
13 years 11 months ago
Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem
As the Internet commerce becomes a more important part of the economy, network security is receiving more emphasis. Time spent in data encryption can be a significant performance ...
Zhi Li, John Higgins, Mark J. Clement
NSDI
2004
13 years 11 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
PDPTA
2004
13 years 11 months ago
Semantic Extensions for the Virtual Enterprise's Grid Infastructure
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows collab...
Ziga Turk, Vlado Stankovski, Matevz Dolenc, Tomo C...
WOTUG
2007
13 years 11 months ago
Integrating and Extending JCSP
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone’s JCSP Network Edition and the â...
Peter H. Welch, Neil Brown, James Moores, Kevin Ch...
« Prev « First page 1228 / 1311 Last » Next »