Sciweavers

33 search results - page 4 / 7
» ccs 2000
Sort
View
CCS
2000
ACM
15 years 3 months ago
Evaluating certificate status information mechanisms
A wide spectrum of certificate revocation mechanisms is currently in use. A number of them have been proposed by standardisation bodies, while some others have originated from aca...
John Iliadis, Diomidis Spinellis, Dimitris Gritzal...
EUROMICRO
2000
IEEE
15 years 3 months ago
Behavior-Preserving Transformations for Design-for-Test
An important aspect in the design of hardware/software systems is design-for-test. Improving the testability of a hardware/software system typically implies improving the controll...
Jeroen Voeten, Harald P. E. Vranken
WFLP
2000
Springer
163views Algorithms» more  WFLP 2000»
15 years 3 months ago
Cooperative Constraint Functional Logic Programming
We describe the current status of the development of CFLP, a system which aims at the integration of the best features of functional logic programming (FLP), cooperative constrain...
Mircea Marin, Tetsuo Ida
CCS
2008
ACM
15 years 1 months ago
Computational soundness of observational equivalence
Many security properties are naturally expressed as indistinguishability between two versions of a protocol. In this paper, we show that computational proofs of indistinguishabili...
Hubert Comon-Lundh, Véronique Cortier
CCS
2000
ACM
15 years 3 months ago
Timing attacks on Web privacy
We describe a class of attacks that can compromise the privacy of users’ Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has ...
Edward W. Felten, Michael A. Schneider