To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10799

Title

Architectures for Self-Healing Databases under Cyber Attacks

Author

Peng Liu, Jiwu Jing

Citation

Vol. 6  No. 1  pp. 204~216

Keywords

Self-Healing Databases, Cyber Security, Architectures


Title

Timed Weak Simulation Verification and its application to Stepwise Refinement of Real-Time Software

Author

Satoshi Yamane

Citation

Vol. 6  No. 1  pp. 192~203

Keywords

Refinement Design Method, Real-Time Software, Timed Weak Simulation Relation, Verification, Real-Time Scheduling


Title

Security Extension for Bresson-Chevassut-Pointcheval's model

Author

Chunjie Cao, Jianfeng Ma, Sangjae Moon

Citation

Vol. 6  No. 1  pp. 184~191

Keywords

Provable security, Distributed computing, Formal model, Multicast security


Title

High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks

Author

Turki F. Al-Somani, M. K. Ibrahim

Citation

Vol. 6  No. 1  pp. 177~183

Keywords

Elliptic Curves Cryptosystems, Mixed Coordinates, Parallel Designs, Normal Basis


[1] ... [prev] [2681] [2682] [2683] [2684] [2685] [2686] [2687] [2688] [2689] [2690] [next] ... [2700]