Sciweavers

1679 search results - page 41 / 336
» Security Properties and CSP
Sort
View
COMCOM
2006
93views more  COMCOM 2006»
13 years 7 months ago
On scalability properties of the Hi3 control plane
The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Pr...
Dmitry Korzun, Andrei Gurtov
ASPLOS
2012
ACM
12 years 3 months ago
Path-exploration lifting: hi-fi tests for lo-fi emulators
Processor emulators are widely used to provide isolation and instrumentation of binary software. However they have proved difficult to implement correctly: processor specificati...
Lorenzo Martignoni, Stephen McCamant, Pongsin Poos...
ICSEA
2006
IEEE
14 years 1 months ago
Enforcing Interaction Properties in AOSD-Enabled Systems
The construction and maintenance of large and complex software systems depend on the existence of global principles describing the structure and the interaction among its various ...
Constantin Serban, Shmuel S. Tyszberowicz
JCP
2007
86views more  JCP 2007»
13 years 7 months ago
Taking Multiple-Choise Quiz by SMS on Mobile Phones Including Analyzing Property
— Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method f...
Mohammad Shirali-Shahreza
EUROPKI
2007
Springer
14 years 1 months ago
AutoPKI: A PKI Resources Discovery System
The central goal of Public Key Infrastructure (PKI) is to enable trust judgments between distributed users. Although certificates play a central role in making such judgments, a P...
Massimiliano Pala, Sean W. Smith