Sciweavers

25 search results - page 2 / 5
» ccs 1998
Sort
View
CCS
1998
ACM
13 years 9 months ago
A Practical Secure Physical Random Bit Generator
Markus Jakobsson, Elizabeth A. M. Shriver, Bruce H...
HCW
1998
IEEE
13 years 9 months ago
CCS Resource Management in Networked HPC Systems
CCS is a resource management system for parallel high-performance computers. At the user level, CCS provides vendor-independent access to parallel systems. At the system administr...
Axel Keller, Alexander Reinefeld
KBSE
1998
IEEE
13 years 9 months ago
Planning Equational Verification in CCS
Most efforts to automate formal verification of communicating systems have centred around finite-state systems (FSSs). However, FSSs are incapable of modelling many practical comm...
Raul Monroy, Alan Bundy, Ian Green
CCS
1998
ACM
13 years 9 months ago
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP. We s...
Bruce Schneier, Mudge
CCS
1998
ACM
13 years 9 months ago
A Specification of Java Loading and Bytecode Verification
This paper gives a mathematical specification the Java Virtual Machine (JVM) bytecode verifier. The specification is an axiomatic description of the verifier that makes precise su...
Allen Goldberg