Sciweavers

2513 search results - page 482 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
14 years 3 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
EUROCRYPT
2004
Springer
14 years 3 months ago
Projective Coordinates Leak
Denoting by P = [k]G the elliptic-curve double-and-add multiplication of a public base point G by a secret k, we show that allowing an adversary access to the projective representa...
David Naccache, Nigel P. Smart, Jacques Stern
ICFEM
2004
Springer
14 years 3 months ago
Learning to Verify Safety Properties
We present a novel approach for verifying safety properties of finite state machines communicating over unbounded FIFO channels that is based on applying machine learning techniqu...
Abhay Vardhan, Koushik Sen, Mahesh Viswanathan, Gu...
SC
2003
ACM
14 years 3 months ago
Quantifying and Improving the Availability of High-Performance Cluster-Based Internet Services
Cluster-based servers can substantially increase performance when nodes cooperate to globally manage resources. However, in this paper we show that cooperation results in a substa...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...
ICFEM
2003
Springer
14 years 3 months ago
Formal Proof of a Polychronous Protocol for Loosely Time-Triggered Architectures
The verification of safety critical systems has become an area of increasing importance in computer science. The notion of reactive system has emerged to concentrate on problems r...
Mickaël Kerboeuf, David Nowak, Jean-Pierre Ta...