To search, Click below search items.
All Published Papers Search Service
Title
Timed Weak Simulation Verification and its application to Stepwise Refinement of Real-Time Software
Author
Satoshi Yamane
Vol. 6 No. 1 pp. 192~203
Keywords
Refinement Design Method, Real-Time Software, Timed Weak Simulation Relation, Verification, Real-Time Scheduling
Security Extension for Bresson-Chevassut-Pointcheval's model
Chunjie Cao, Jianfeng Ma, Sangjae Moon
Vol. 6 No. 1 pp. 184~191
Provable security, Distributed computing, Formal model, Multicast security
High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks
Turki F. Al-Somani, M. K. Ibrahim
Vol. 6 No. 1 pp. 177~183
Elliptic Curves Cryptosystems, Mixed Coordinates, Parallel Designs, Normal Basis
Design of Secure Clustering Routing Protocol using SNEP and ?TESLA on Sensor Network Communication
Kun-Won Jang, Woo-sik Jung, Dong-kyu Shin, Moon-Seog Jun
Vol. 6 No. 1 pp. 171~176
Sensor network, Key management, Clustering, Energy savings