Sciweavers

1112 search results - page 123 / 223
» software 2002
Sort
View
ICSM
2002
IEEE
15 years 8 months ago
Two Controlled Experiments Concerning the Usefulness of Assertions as a Means for Programming
Assertions, or more generally “Programming by contract”, have gained widespread acceptance in the computer science community as a means for correct program development. Howeve...
Matthias M. Müller, Rainer Typke, Oliver Hagn...
ICSM
2002
IEEE
15 years 8 months ago
An Application Server to Support Online Evolution
Most online evolution of application depends on its runtime environment. This paper addresses how to support online evolution by application server, which is considered as third k...
Qianxiang Wang, Feng Chen, Hong Mei, Fuqing Yang
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
15 years 8 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
AMAST
2000
Springer
15 years 7 months ago
A New Logic for Electronic Commerce Protocols
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
Kamel Adi, Mourad Debbabi, Mohamed Mejri
JSS
2002
84views more  JSS 2002»
15 years 3 months ago
The impact of component architectures on interoperability
Component interoperability has become an important concern as companies migrate legacy systems, integrate COTS products, and assemble modules from disparate sources into a single ...
Leigh A. Davis, Rose F. Gamble, Jamie Payton