Sciweavers

2303 search results - page 48 / 461
» The Cryptographic Abstract Machine
Sort
View
SP
1990
IEEE
15 years 6 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
EIT
2008
IEEE
15 years 4 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
153
Voted
OMER
2001
15 years 3 months ago
State Machine Modeling: From Synch States to Synchronized State Machines
Abstract: To synchronize concurrent regions of a state machine, the Unified Modeling Language (UML) provides the concept of so-called "synch states". Synch states insure ...
Dominikus Herzberg, André Marburger
141
Voted
TPHOL
2009
IEEE
15 years 9 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
114
Voted
CEC
2010
IEEE
15 years 3 months ago
SBArt4 - Breeding abstract animations in realtime
Breeding Abstract Animations in Realtime Tatsuo Unemi SBART was developed in early 1990's as one of the derivatives from Artificial Evolution by Karl Sims. It has a functional...
Tatsuo Unemi