Sciweavers

372 search results - page 6 / 75
» Transaction Based Modeling and Verification of Hardware Prot...
Sort
View
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 7 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
ACSD
2006
IEEE
109views Hardware» more  ACSD 2006»
15 years 6 months ago
Synthesis of Synchronous Interfaces
Reuse of IP blocks has been advocated as a means to conquer the complexity of today's system-on-chip (SoC) designs. Component integration and verification in such systems is ...
Purandar Bhaduri, S. Ramesh
CODES
2008
IEEE
15 years 10 months ago
You can catch more bugs with transaction level honey
In this special session we explore holistic approaches to hardware/software debug that use or integrate transaction level models (TLMs). We present several TLM-based approaches to...
Miron Abramovici, Kees Goossens, Bart Vermeulen, J...
CIKM
2009
Springer
15 years 10 months ago
Transaction synchronization protocol using XML in client-server environment
The problem of transaction synchronization is important in XMLbased applications based on client-server model, especially when both server and clients are allowed to store data. W...
Noman Zahid, Muhammad Shahid Ansari, Kyung-Goo Doh
ACSD
2004
IEEE
90views Hardware» more  ACSD 2004»
15 years 7 months ago
A Front-End Tool for Automated Abstraction and Modular Verification of Actor-Based Models
Marjan Sirjani, Amin Shali, Mohammad Mahdi Jaghoor...