Sciweavers

1777 search results - page 143 / 356
» Programming Cryptographic Protocols
Sort
View
ERSHOV
2009
Springer
15 years 5 months ago
A Java Supercompiler and Its Application to Verification of Cache-Coherence Protocols
Abstract. The Java Supercompiler (JScp) is a specializer of Java programs based on the Turchin's supercompilation method and extended to support imperative and object-oriented...
Andrei V. Klimov
IFIP
2005
Springer
15 years 6 months ago
On Anonymity with Identity Escrow
Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exception...
Aybek Mukhamedov, Mark Dermot Ryan
ICIP
1998
IEEE
16 years 2 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
PERCOM
2005
ACM
16 years 27 days ago
Toward Unlinkable ID Management for Multi-Service Environments
As pervasive computing environments become popular, ID devices, such as smart cards and RFID tags, introduce multi-service environments, in which a user can receive multiple servi...
Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura
ARITH
2009
IEEE
15 years 8 months ago
Selected RNS Bases for Modular Multiplication
The selection of the elements of the bases in an RNS modular multiplication method is crucial and has a great impact in the overall performance. This work proposes specific sets ...
Jean-Claude Bajard, Marcelo E. Kaihara, Thomas Pla...