Sciweavers

1620 search results - page 137 / 324
» Use Case Level Pointcuts
Sort
View
116
Voted
SASP
2009
IEEE
222views Hardware» more  SASP 2009»
15 years 10 months ago
Arithmetic optimization for custom instruction set synthesis
Abstract—One of the ways that custom instruction set extensions can improve over software execution is through the use of hardware structures that have been optimized at the arit...
Ajay K. Verma, Yi Zhu, Philip Brisk, Paolo Ienne
123
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
RTA
2005
Springer
15 years 8 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
ECIS
2000
15 years 4 months ago
Functional Integration Test of Mass Processes with Electronic Signatures in Public Administration
Nowadays, almost all public administration plan to establish processes with electronic signatures. For such processes, there are no standardized system models with test cases. We a...
B. Lapken, Frank Losemann, Thomas Engel, Christoph...
134
Voted
CSMR
2006
IEEE
15 years 9 months ago
Scenario-Driven Dynamic Analysis for Comprehending Large Software Systems
Understanding large software systems is simplified when a combination of techniques for static and dynamic analysis is employed. Effective dynamic analysis requires that executio...
Maher Salah, Spiros Mancoridis, Giuliano Antoniol,...