Sciweavers

1953 search results - page 229 / 391
» codes 2010
Sort
View
CODES
2011
IEEE
14 years 4 months ago
Design and architectures for dependable embedded systems
The paper presents an overview of a major research project on dependable embedded systems that has started in Fall 2010 and is running for a projected duration of six years. Aim i...
Jörg Henkel, Lars Bauer, Joachim Becker, Oliv...
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 12 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
162
Voted
WAIFI
2010
Springer
189views Mathematics» more  WAIFI 2010»
15 years 10 months ago
Delaying Mismatched Field Multiplications in Pairing Computations
Abstract. Miller’s algorithm for computing pairings involves performing multiplications between elements that belong to different finite fields. Namely, elements in the full e...
Craig Costello, Colin Boyd, Juan Manuel Gonz&aacut...
CORR
2010
Springer
156views Education» more  CORR 2010»
15 years 1 months ago
FauxCrypt - A Method of Text Obfuscation
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Devlin M. Gualtieri
TGC
2010
Springer
15 years 2 months ago
Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode
Recent work in resource analysis has translated the idea of amortised resource analysis to imperative languages using a program logic that allows mixing of assertions about heap sh...
David Aspinall, Robert Atkey, Kenneth MacKenzie, D...