Sciweavers

1394 search results - page 93 / 279
» Executing Nested Queries
Sort
View
WISTP
2007
Springer
15 years 10 months ago
Reverse Engineering Java Card Applets Using Power Analysis
Abstract. Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets revers...
Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjie...
ISPAN
2005
IEEE
15 years 9 months ago
Maximum Loop Distribution and Fusion for Two-level Loops Considering Code Size
In this paper, we propose a technique combining loop distribution with loop fusion to improve the timing performance without increasing the code size of the transformed loops. We ...
Meilin Liu, Qingfeng Zhuge, Zili Shao, Chun Xue, M...
131
Voted
ICTCS
2005
Springer
15 years 9 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ICDCS
2002
IEEE
15 years 9 months ago
Design of a Policy-Driven Middleware for Secure Distributed Collaboration
We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification m...
Anand R. Tripathi, Tanvir Ahmed, Richa Kumar, Shre...
WORDS
2002
IEEE
15 years 9 months ago
Auction System Design Using Open Multithreaded Transactions
Open Multithreaded Transactions form an advanced transaction model that provides features for controlling and structuring not only accesses to objects, as usual in transaction sys...
Jörg Kienzle, Alfred Strohmeier, Alexander B....