Sciweavers

292 search results - page 37 / 59
» Computing Criticality of Lines in Power Systems
Sort
View
WECWIS
2005
IEEE
116views ECommerce» more  WECWIS 2005»
15 years 3 months ago
Security and Privacy Using One-Round Zero-Knowledge Proofs
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal wi...
Sultan Almuhammadi, Clifford Neuman
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
15 years 3 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
OPODIS
2004
14 years 11 months ago
Embedded Systems - Challenges and Work Directions
Embedded Systems are components integrating software and hardware jointly and specifically designed to provide given functionalities. These components may be used in many different...
Joseph Sifakis
POPL
2006
ACM
15 years 10 months ago
Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations
The TCP/IP protocols and Sockets API underlie much of modern computation, but their semantics have historically been very complex and ill-defined. The real standard is the de fact...
Steve Bishop, Matthew Fairbairn, Michael Norrish, ...
85
Voted
APCSAC
2006
IEEE
15 years 3 months ago
Reorganizing UNIX for Reliability
In this paper, we discuss the architecture of a modular UNIX-compatible operating system, MINIX 3, that provides reliability beyond that of most other systems. With nearly the ent...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...