Sciweavers

1777 search results - page 250 / 356
» Programming Cryptographic Protocols
Sort
View
ENTCS
2007
107views more  ENTCS 2007»
15 years 1 months ago
Modeling Environment for Component Model Checking from Hierarchical Architecture
Application of model checking to isolated software components is not directly possible because a component does not form a complete program - the problem of missing environment oc...
Pavel Parizek, Frantisek Plasil
IJISEC
2010
121views more  IJISEC 2010»
15 years 1 days ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
IAT
2010
IEEE
14 years 11 months ago
Modular JADE Agents Design and Implementation Using ASEME
ASEME is an emerging Agent Oriented Software Engineering (AOSE) methodology. The Model-Driven Engineering (MDE) paradigm encourages software modelers to automate the transition of...
Nikolaos I. Spanoudakis, Pavlos Moraitis
TLDI
2009
ACM
155views Formal Methods» more  TLDI 2009»
15 years 10 months ago
Opis: reliable distributed systems in OCaml
The importance of distributed systems is growing as computing devices become ubiquitous and bandwidth becomes plentiful. Concurrency and distribution pose algorithmic and implemen...
Pierre-Évariste Dagand, Dejan Kostic, Vikto...
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
15 years 6 months ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård