Sciweavers

1777 search results - page 184 / 356
» Programming Cryptographic Protocols
Sort
View
FC
1997
Springer
86views Cryptology» more  FC 1997»
15 years 5 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
NDSS
2007
IEEE
15 years 7 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
OOPSLA
2007
Springer
15 years 7 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
PADL
2007
Springer
15 years 7 months ago
Applications, Implementation and Performance Evaluation of Bit Stream Programming in Erlang
Writing code that manipulates bit streams is a painful and error-prone programming task, often performed via bit twiddling techniques such as explicit bit shifts and bit masks in p...
Per Gustafsson, Konstantinos F. Sagonas
GECCO
2009
Springer
107views Optimization» more  GECCO 2009»
15 years 6 months ago
Evolving distributed algorithms with genetic programming: election
In this paper, we present a detailed analysis of the application of Genetic Programming to the evolution of distributed algorithms. This research field has many facets which make...
Thomas Weise, Michael Zapf