Sciweavers

694 search results - page 101 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
15 years 5 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
INFORMATICASI
2010
14 years 9 months ago
Planning to Discover and Counteract Attacks
Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...
WWW
2007
ACM
16 years 14 days ago
Analyzing web access control policies
XACML has emerged as a popular access control language on the Web, but because of its rich expressiveness, it has proved difficult to analyze in an automated fashion. In this pape...
Vladimir Kolovski, James A. Hendler, Bijan Parsia
CORR
2002
Springer
114views Education» more  CORR 2002»
14 years 11 months ago
Offline Specialisation in Prolog Using a Hand-Written Compiler Generator
The so called "cogen approach" to program specialisation, writing a compiler generator instead of a specialiser, has been used with considerable success in partial evalu...
Michael Leuschel, Jesper Jørgensen, Wim Van...
OOPSLA
2005
Springer
15 years 5 months ago
Demand-driven points-to analysis for Java
We present a points-to analysis technique suitable for environments with small time and memory budgets, such as just-in-time (JIT) compilers and interactive development environmen...
Manu Sridharan, Denis Gopan, Lexin Shan, Rastislav...