Sciweavers

905 search results - page 40 / 181
» The Case Against Micropayments
Sort
View
CCGRID
2005
IEEE
15 years 5 months ago
Application-level simulation modelling of large grids
The simulation of large grids requires the generation of grid instances and an approximation of grid components’ behaviour. To generate grid instances, this paper outlines a set...
Serafeim Zanikolas, Rizos Sakellariou
CASSIS
2004
Springer
15 years 5 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
CASES
2009
ACM
15 years 4 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
SACRYPT
2001
Springer
130views Cryptology» more  SACRYPT 2001»
15 years 4 months ago
On the Complexity of Matsui's Attack
Linear cryptanalysis remains the most powerful attack against DES at this time. Given 243 known plaintext-ciphertext pairs, Matsui expected a complexity of less than 243 DES evalua...
Pascal Junod
ASM
2008
ASM
15 years 1 months ago
A Concept-Driven Construction of the Mondex Protocol Using Three Refinements
Abstract. The Mondex case study concerns the formal development and verification of an electronic purse protocol. Several groups have worked on its specification and mechanical ver...
Gerhard Schellhorn, Richard Banach