Sciweavers

949 search results - page 150 / 190
» Design methods for security and trust
Sort
View
EUROCRYPT
1995
Springer
15 years 7 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail
VTC
2010
IEEE
147views Communications» more  VTC 2010»
15 years 2 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang
CQRE
1999
Springer
15 years 8 months ago
Electronic Payments: Where Do We Go from Here?
Currently, the Internet and the World Wide Web on-line business is booming, with traffic, advertising and content growing at sustained exponential rates. However, the full potentia...
Markus Jakobsson, David M'Raïhi, Yiannis Tsio...
OOPSLA
2007
Springer
15 years 10 months ago
Recursive adaptive computations using perobject visitors
Adaptive Programming allows developers to write structureshy programs. However, in Adaptive Programming, recursive computations are known to require a good deal of boiler plate co...
Ahmed Abdelmeged, Karl J. Lieberherr
ICSE
1993
IEEE-ACM
15 years 8 months ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan