Sciweavers

177 search results - page 19 / 36
» Provably Secure Key Exchange: An Engineering Approach
Sort
View
LANMR
2007
14 years 11 months ago
Dialetheic truth theory: inconsistency, non-triviality, soundness, incompleteness
The best-known application of dialetheism is to semantic paradoxes such as the Liar. In particular, Graham Priest has advocated the adoption of an axiomatic truth theory in which c...
Federico Marulanda Rey
IASTEDSEA
2004
14 years 11 months ago
Engineering long-lived applications using MDA
Creating long-lived software systems requires a technology to build systems with good maintainability. One of the core ideas of the Model Driven Architecture (MDA) is to ease the ...
Tilman Seifert, Gerd Beneken, Niko Baehr
RIVF
2007
14 years 11 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille
APSEC
2006
IEEE
15 years 3 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han
DRM
2007
Springer
15 years 3 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...