Sciweavers

2958 search results - page 339 / 592
» Extending and Implementing RASP
Sort
View
204
Voted
AADEBUG
2005
Springer
15 years 6 months ago
Code coverage testing using hardware performance monitoring support
Code coverage analysis, the process of finding code exercised by a particular set of test inputs, is an important component of software development and verification. Most tradit...
Alex Shye, Matthew Iyer, Vijay Janapa Reddi, Danie...
ICWE
2005
Springer
15 years 6 months ago
Modelling the Behaviour of Web Applications with ArgoUWE
A methodology needs to be empowered by appropriate tool support. The CASE tool ArgoUWE supports designers in the use of the UWE methodology for the systematic, UML-based developmen...
Alexander Knapp, Nora Koch, Gefei Zhang
ISPEC
2005
Springer
15 years 6 months ago
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revocation and with simple group setup. A linkable ring signature (LRS) scheme additio...
Patrick P. Tsang, Victor K. Wei
112
Voted
TCC
2005
Springer
116views Cryptology» more  TCC 2005»
15 years 6 months ago
Error Correction in the Bounded Storage Model
We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have incon...
Yan Zong Ding
99
Voted
CSFW
2003
IEEE
15 years 6 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows