Sciweavers

372 search results - page 6 / 75
» Transaction Based Modeling and Verification of Hardware Prot...
Sort
View
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 1 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
ACSD
2006
IEEE
109views Hardware» more  ACSD 2006»
14 years 11 months ago
Synthesis of Synchronous Interfaces
Reuse of IP blocks has been advocated as a means to conquer the complexity of today's system-on-chip (SoC) designs. Component integration and verification in such systems is ...
Purandar Bhaduri, S. Ramesh
CODES
2008
IEEE
15 years 4 months ago
You can catch more bugs with transaction level honey
In this special session we explore holistic approaches to hardware/software debug that use or integrate transaction level models (TLMs). We present several TLM-based approaches to...
Miron Abramovici, Kees Goossens, Bart Vermeulen, J...
CIKM
2009
Springer
15 years 4 months ago
Transaction synchronization protocol using XML in client-server environment
The problem of transaction synchronization is important in XMLbased applications based on client-server model, especially when both server and clients are allowed to store data. W...
Noman Zahid, Muhammad Shahid Ansari, Kyung-Goo Doh
ACSD
2004
IEEE
90views Hardware» more  ACSD 2004»
15 years 1 months ago
A Front-End Tool for Automated Abstraction and Modular Verification of Actor-Based Models
Marjan Sirjani, Amin Shali, Mohammad Mahdi Jaghoor...