In this paper we present aspect-oriented programming laws that are useful for deriving refactorings for AspectJ. The laws help developers to verify if the transformations they deļ...
Popular mobile code architectures (Java and .NET) include veriļ¬ers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
This paper explores the application of wearable computer systems to threat response, exemplified by the Multi-functional Micro-controllable Interface Module (MMIM)/Digital Militar...
Noa M. Rensing, Evan Weststrate, Paul M. Zavracky,...
We present the adaptation of our model for the validation of key distribution and authentication protocols to address speciļ¬c needs of protocols for electronic commerce. The two ...