Sciweavers

498 search results - page 81 / 100
» A Formal Foundation for XrML
Sort
View
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
ESOP
2003
Springer
15 years 3 months ago
Modeling Web Interactions
Programmers confront a minefield when they design interactive Web programs. Web interactions take place via Web browsers. With browsers, consumers can whimsically navigate among t...
Paul T. Graunke, Robert Bruce Findler, Shriram Kri...
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 2 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
ECOOP
2010
Springer
15 years 2 months ago
Capabilities for Uniqueness and Borrowing
Abstract. An important application of unique object references is safe and efficient message passing in concurrent object-oriented programming. However, to prevent the ill effects...
Philipp Haller, Martin Odersky
CAISE
2001
Springer
15 years 2 months ago
Using UML Action Semantics for Executable Modeling and Beyond
The UML lacks precise and formal foundations for several constructs such as transition guards or method bodies, for which it resorts to semantic loopholes in the form of “uninter...
Gerson Sunyé, François Pennaneac'h, ...