Sciweavers

2363 search results - page 460 / 473
» How Secure is RFID
Sort
View
POPL
1999
ACM
15 years 8 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett
LCR
1998
Springer
119views System Software» more  LCR 1998»
15 years 8 months ago
QoS Aspect Languages and Their Runtime Integration
Abstract. Distributedobject middleware, suchas CORBA, hides systemand network-speci c characteristics of objects behind functional interface speci cations. This simpli es developme...
Joseph P. Loyall, David E. Bakken, Richard E. Scha...
AGTIVE
2007
Springer
15 years 8 months ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
15 years 7 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
15 years 7 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...