Sciweavers

10585 search results - page 1968 / 2117
» The Orc Programming Language
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 6 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
COMPSAC
2003
IEEE
15 years 6 months ago
Incremental Transformation of Procedural Systems to Object Oriented Platforms
Over the past years, the reengineering of legacy software systems to object oriented platforms has received significant attention. In this paper, we present a generic re-engineeri...
Ying Zou, Kostas Kontogiannis
CSFW
2003
IEEE
15 years 6 months ago
Probabilistic Noninterference through Weak Probabilistic Bisimulation
To be practical, systems for ensuring secure information flow must be as permissive as possible. To this end, the author recently proposed a type system for multi-threaded progra...
Geoffrey Smith
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 6 months ago
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host ...
Tommaso Cucinotta, Marco Di Natale, David Corcoran
89
Voted
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
15 years 6 months ago
Project JXTA-C: Enabling a Web of Things
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...
« Prev « First page 1968 / 2117 Last » Next »