Sciweavers

2236 search results - page 278 / 448
» Secure Software Design in Practice
Sort
View
CCS
2008
ACM
15 years 2 days ago
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
To ensure that a trust negotiation succeeds whenever possible, authorization policy compliance checkers must be able to find all minimal sets of their owners' credentials tha...
Adam J. Lee, Marianne Winslett
IACR
2011
115views more  IACR 2011»
13 years 9 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky
INDOCRYPT
2003
Springer
15 years 3 months ago
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
The RC4 stream cipher is the most widely used software based stream cipher. It is based on a secret internal state of N = 256 bytes and two pointers. This paper proposes an efficie...
Souradyuti Paul, Bart Preneel
EURODAC
1994
IEEE
133views VHDL» more  EURODAC 1994»
15 years 2 months ago
Mixed electrical-thermal and electrical-mechanical simulation of electromechatronic systems using PSpice
- The design methodology and technique is presented to expand the power of commercial SPICE to simulate mixed electricalthermal-mechanical microsystems, consisting of motors being ...
Konstantin O. Petrosjanc, Peter P. Maltcev
WOA
2003
14 years 11 months ago
Filling the Gap Between Users and Objects: a Multichannel Interactive Environment
— The design and the implementation of software for mobile computers and for pervasive computing environments entail several issues and lead to new requirements. Applications mus...
Davide Carboni, Andrea Piras, Stefano Sanna, Gavin...