Sciweavers

83 search results - page 2 / 17
» Flow Control: A New Approach for Anonymity Control in Electr...
Sort
View
JOC
2000
181views more  JOC 2000»
13 years 6 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
ATC
2008
Springer
13 years 8 months ago
Concepts for Autonomous Control Flow Checking for Embedded CPUs
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Daniel Ziener, Jürgen Teich
DSN
2005
IEEE
13 years 12 months ago
On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP Core
1 In sub-micron technology circuits high integration levels coupled with the increased sensitivity to soft errors even at ground level make the task of guaranteeing systems’ depe...
Paolo Bernardi, Leticia Maria Veiras Bolzani, Maur...
FORTEST
2008
13 years 7 months ago
From MC/DC to RC/DC: Formalization and Analysis of Control-Flow Testing Criteria
This paper describes an approach to the formalization of existing criteria used in computer systems software testing and proposes a new Reinforced Condition/Decision Coverage (RC/D...
Sergiy A. Vilkomir, Jonathan P. Bowen
DATE
2010
IEEE
163views Hardware» more  DATE 2010»
13 years 10 months ago
Efficient High-Level modeling in the networking domain
-- Starting Electronic System Level (ESL) design flows with executable High-Level Models (HLMs) has the potential to sustainably improve productivity. However, writing good HLMs fo...
Christian Zebelein, Joachim Falk, Christian Haubel...