Sciweavers

624 search results - page 68 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
CTW
2006
107views more  CTW 2006»
14 years 12 months ago
Human computer interaction methods for electronic flight bag envisionment and design
This paper reports on the application of a range of human computer interaction (HCI) methods to the redesign of an electronic flight bag (EFB), as part of a commercial software dev...
Joan Cahill, Nick McDonald
SIGMOD
2009
ACM
192views Database» more  SIGMOD 2009»
16 years 2 days ago
A gauss function based approach for unbalanced ontology matching
Ontology matching, aiming to obtain semantic correspondences between two ontologies, has played a key role in data exchange, data integration and metadata management. Among numero...
Qian Zhong, Hanyu Li, Juanzi Li, Guo Tong Xie, Jie...
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 3 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
IWSEC
2007
Springer
15 years 6 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...
OOPSLA
2005
Springer
15 years 5 months ago
MDAbench: a tool for customized benchmark generation using MDA
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performanc...
Liming Zhu, Yan Liu, Ian Gorton, Ngoc Bao Bui