Sciweavers

1288 search results - page 32 / 258
» Securing aspect composition
Sort
View
IJUFKS
2000
65views more  IJUFKS 2000»
13 years 8 months ago
Some Group Theoretic Aspects of t-Norms
Continuous archimedean t-norms are generated by automorphisms f of ([0; 1]; ), the unit interval with its usual order structure. Such strict t-norms 4 are given by x 4 y = f 1 (f(...
Fred Richman, Elbert A. Walker
ICECCS
2008
IEEE
3385views Hardware» more  ICECCS 2008»
14 years 3 months ago
Contract-Based Approach to Analyze Software Components
Component-based software development focuses on building large software systems by integrating existing software components to reduce cost, risk and time. However, behavioural and...
Abdelhafid Zitouni, Lionel Seinturier, Mahmoud Bou...
EUROCRYPT
2006
Springer
14 years 19 days ago
Composition Implies Adaptive Security in Minicrypt
To prove that a secure key-agreement protocol exists one must at least show P = NP. Moreover any proof that the sequential composition of two non-adaptively secure pseudorandom fun...
Krzysztof Pietrzak
SISW
2003
IEEE
14 years 2 months ago
Information Security on the Logistical Network: An End-to-End Approach
We describe the information security aspects of logistical networking. The security model adopted by logistical networking is an end-to-end model that provides tunable security le...
Micah Beck, James S. Plank, Jeremy Millar, Scott A...
SPLC
2007
13 years 10 months ago
Product Line Implementation using Aspect-Oriented and Model-Driven Software Development
Software product line engineering aims to reduce development time, effort, cost, and complexity by taking advantage of the commonality within a portfolio of similar products. The ...
Markus Völter, Iris Groher