Reena Elangovan, Shubham Jain, et al.
ACM TODAES
Separation of concerns and layers of abstraction have long been advocated by proponents of programming methodology and have been used effectively for building large scale systems. Developments on power analysis attacks on cryptographic implementations were used to raise some questions about the applicability of these approaches especially to cryptography and security. Some of the formal methods are presented.
Reena Elangovan, Shubham Jain, et al.
ACM TODAES
Yvonne Anne Pignolet, Stefan Schmid, et al.
Discrete Mathematics and Theoretical Computer Science
Raghu Krishnapuram, Krishna Kummamuru
IFSA 2003
Fan Jing Meng, Ying Huang, et al.
ICEBE 2007