Sciweavers

1116 search results - page 78 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
DIM
2007
ACM
15 years 4 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
96
Voted
ESOP
2010
Springer
15 years 10 months ago
Amortized Resource Analysis with Polynomial Potential - A Static Inference of Polynomial Bounds for Functional Programs
In 2003, Hofmann and Jost introduced a type system that uses a potential-based amortized analysis to infer bounds on the resource consumption of (first-order) functional programs. ...
Jan Hoffmann and Martin Hofmann
92
Voted
ECMDAFA
2006
Springer
137views Hardware» more  ECMDAFA 2006»
15 years 4 months ago
A Canonical Scheme for Model Composition
There is little agreement on terminology in model composition, and even less on key characteristics of a model composition solution. We present three composition frameworks: the At...
Jean Bézivin, Salim Bouzitouna, Marcos Dido...
106
Voted
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
15 years 7 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
JUCS
2010
139views more  JUCS 2010»
14 years 7 months ago
Validating Modal Aspects of OntoUML Conceptual Models Using Automatically Generated Visual World Structures
: Assessing the quality of conceptual models is key to ensure that conceptual models can be used effectively as a basis for understanding, agreement and construction of information...
Alessander Botti Benevides, Giancarlo Guizzardi, B...