Sciweavers

905 search results - page 40 / 181
» The Case Against Micropayments
Sort
View
CCGRID
2005
IEEE
14 years 1 months ago
Application-level simulation modelling of large grids
The simulation of large grids requires the generation of grid instances and an approximation of grid components’ behaviour. To generate grid instances, this paper outlines a set...
Serafeim Zanikolas, Rizos Sakellariou
CASSIS
2004
Springer
14 years 1 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
CASES
2009
ACM
14 years 17 days ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
SACRYPT
2001
Springer
130views Cryptology» more  SACRYPT 2001»
14 years 9 days ago
On the Complexity of Matsui's Attack
Linear cryptanalysis remains the most powerful attack against DES at this time. Given 243 known plaintext-ciphertext pairs, Matsui expected a complexity of less than 243 DES evalua...
Pascal Junod
ASM
2008
ASM
13 years 10 months ago
A Concept-Driven Construction of the Mondex Protocol Using Three Refinements
Abstract. The Mondex case study concerns the formal development and verification of an electronic purse protocol. Several groups have worked on its specification and mechanical ver...
Gerhard Schellhorn, Richard Banach