Abstract. Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. Th...
We describe an embedding of the ACL2 logic into higherorder logic. An implementation of this embedding allows ACL2 to be used as an oracle for higher-order logic provers. Categori...
Michael J. C. Gordon, Warren A. Hunt Jr., Matt Kau...
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
In recent years a movement from distributed systems controlled by users to automatic, autonomous and self-configuring distributed systems is noticeable. Web services is one approa...
Elmar Zeeb, Andreas Bobek, Hendrik Bohn, Frank Gol...
Pervasive computing's historical driver applications include environmental monitoring, safety and security, home and office productivity and guided experience of cultural act...
Jeff Burke, Jonathan Friedman, Eitan Mendelowitz, ...