Sciweavers

1777 search results - page 181 / 356
» Programming Cryptographic Protocols
Sort
View
ECOOP
2007
Springer
15 years 7 months ago
Towards correct evolution of components using VPA-based aspects
Abstract. Interaction protocols are a popular means to construct correct component-based systems. Aspects that modify such protocols are interesting in this context because they su...
Dong Ha Nguyen, Mario Südholt
ASPLOS
2004
ACM
15 years 6 months ago
Coherence decoupling: making use of incoherence
This paper explores a new technique called coherence decoupling, which breaks a traditional cache coherence protocol into two protocols: a Speculative Cache Lookup (SCL) protocol ...
Jaehyuk Huh, Jichuan Chang, Doug Burger, Gurindar ...
PADS
1999
ACM
15 years 5 months ago
Performance Prediction Tools for Parallel Discrete-Event Simulation
We have developed a set of performance prediction tools which help to estimate the achievable speedups from parallelizing a sequential simulation. The tools focus on two important...
Chu-Cheow Lim, Yoke-Hean Low, Boon-Ping Gan, Sanja...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 5 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
IFIP
2009
Springer
14 years 11 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan