Sciweavers

1446 search results - page 175 / 290
» Formal analysis of hardware requirements
Sort
View
FUIN
2006
69views more  FUIN 2006»
15 years 24 days ago
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Traditionally, due to efficiency considerations, when encrypting long messages using an asymmtric cryptosystem, one needs to use a symmetric cryptosystem in addition. To eliminate ...
Sheng Zhong
113
Voted
IJWIN
2006
209views more  IJWIN 2006»
15 years 23 days ago
On Connected Multiple Point Coverage in Wireless Sensor Networks
Abstract-- We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a s...
Shuhui Yang, Fei Dai, Mihaela Cardei, Jie Wu, Floy...
106
Voted
JSW
2008
101views more  JSW 2008»
15 years 23 days ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza
INFSOF
2002
65views more  INFSOF 2002»
15 years 14 days ago
The documentary structure of source code
Many tools designed to help programmers view and manipulate source code exploit the formal structure of the programming language. Language-based tools use information derived via ...
Michael L. Van de Vanter
ICSE
2008
IEEE-ACM
16 years 27 days ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens