To search, Click below search items.
All Published Papers Search Service
Title
Architectures for Self-Healing Databases under Cyber Attacks
Author
Peng Liu, Jiwu Jing
Vol. 6 No. 1 pp. 204~216
Keywords
Self-Healing Databases, Cyber Security, Architectures
Timed Weak Simulation Verification and its application to Stepwise Refinement of Real-Time Software
Satoshi Yamane
Vol. 6 No. 1 pp. 192~203
Refinement Design Method, Real-Time Software, Timed Weak Simulation Relation, Verification, Real-Time Scheduling
Security Extension for Bresson-Chevassut-Pointcheval's model
Chunjie Cao, Jianfeng Ma, Sangjae Moon
Vol. 6 No. 1 pp. 184~191
Provable security, Distributed computing, Formal model, Multicast security
High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks
Turki F. Al-Somani, M. K. Ibrahim
Vol. 6 No. 1 pp. 177~183
Elliptic Curves Cryptosystems, Mixed Coordinates, Parallel Designs, Normal Basis