Sciweavers

2303 search results - page 53 / 461
» The Cryptographic Abstract Machine
Sort
View
ICCS
2007
Springer
15 years 8 months ago
Representation Levels Within Knowledge Representation
Abstract. Representation of knowledge is used to store and retrieve informational data in a machine. Since meaning cannot be directly stored in the computer; this work proposes a s...
Heather D. Pfeiffer, Joseph J. Pfeiffer
222
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Cooperative Security for Network Coding File Distribution
Abstract— Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify blocks with traditional cryptographic sig...
Christos Gkantsidis, Pablo Rodriguez
CHES
2004
Springer
230views Cryptology» more  CHES 2004»
15 years 8 months ago
Correlation Power Analysis with a Leakage Model
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
Eric Brier, Christophe Clavier, Francis Olivier
SPIN
2001
Springer
15 years 7 months ago
Transformations for Model Checking Distributed Java Programs
Abstract. This paper describes three program transformations that extend the scope of model checkers for Java programs to include distributed programs, i.e., multi-process programs...
Scott D. Stoller, Yanhong A. Liu
ASIACRYPT
2001
Springer
15 years 6 months ago
Self-Blindable Credential Certificates from the Weil Pairing
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The ...
Eric R. Verheul