Sciweavers

3003 search results - page 405 / 601
» Software Security: Building Security In
Sort
View
TC
1998
15 years 4 months ago
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
—The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed a...
Jean-Charles Fabre, Tanguy Pérennou
129
Voted
JCS
2011
74views more  JCS 2011»
15 years 1 hour ago
Model-checking trace-based information flow properties
In this paper we consider the problem of verifying trace-based information flow properties for different classes of system models. We begin by proposing an automata-theoretic te...
Deepak D'Souza, Raveendra Holla, K. R. Raghavendra...
CORR
2011
Springer
180views Education» more  CORR 2011»
14 years 11 months ago
A Formalization of Polytime Functions
Abstract. We present a deep embedding of Bellantoni and Cook’s syntactic characterization of polytime functions. We prove formally that it is correct and complete with respect to...
Sylvain Heraud, David Nowak
CANS
2011
Springer
258views Cryptology» more  CANS 2011»
14 years 5 months ago
Fast Computation on Encrypted Polynomials and Applications
In this paper, we explore fast algorithms for computing on encrypted polynomials. More specifically, we describe efficient algorithms for computing the Discrete Fourier Transform,...
Payman Mohassel
170
Voted
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
15 years 11 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov