Sciweavers

2303 search results - page 60 / 461
» The Cryptographic Abstract Machine
Sort
View
140
Voted
DBSEC
2007
112views Database» more  DBSEC 2007»
15 years 4 months ago
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments
Abstract. The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated...
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ra...
143
Voted
IFIP
2010
Springer
14 years 9 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...
194
Voted
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 6 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
118
Voted
RSP
2000
IEEE
100views Control Systems» more  RSP 2000»
15 years 6 months ago
A Hardware Virtual Machine for the Networked Reconfiguration
Networked reconfiguration is an enabling technology for cost effective service deployment and maintenance. A hardware virtual machine to enable this networked reconfigurapresented...
Yajun Ha, Patrick Schaumont, Marc Engels, Serge Ve...
123
Voted
IFL
2004
Springer
138views Formal Methods» more  IFL 2004»
15 years 8 months ago
A Rational Deconstruction of Landin's SECD Machine
Landin’s SECD machine was the first abstract machine for the λ-calculus viewed as a programming language. Both theoretically as a model of computation and practically as an ide...
Olivier Danvy