Thomas Eirich

Learn More
SSL is the de facto standard today for securing end-to-end transport on the Internet. While the protocol itself seems rather secure, there are a number of risks that lurk in its use, for example, in web banking. However, the adoption of password-based key-exchange protocols can overcome some of these problems. We propose the integration of such a protocol(More)
This paper introduces a new virtual machine for sensor networks and small embedded devices which has been designed with efficient resource usage and an event-driven programming model in mind. The virtual machine runs on 8, 16, and 32-bit micro-controllers with as little as 4KBof volatile and 32 KB of non-volatile memory. Our virtual machine is not bound to(More)
functionality would significantly extend smart card possibilities. However, until very recently, such promises have not been backed by real implementations; JavaCard existence has been limited to reference implementations—better known as simulations. However, JavaCard implementations now exist and the technology is beginning to live up to the hype. A(More)
Energy-efficiency is key to meet lifetime requirements of Wireless Sensor Networks (WSN) applications. Today's run-time platforms and development environments leave it to the application developer to manage power consumption. For best results, the characteristics of the individual hardware platforms must be well understood and minutely directed. An(More)
The paper discusses problems of checkpointing in distributed object systems and presents an algorithm suited optimally to their fine-grained structure. Usually, checkpoint algorithms assume nodes or processes as system units. This assumption results in a coarse-grained structure of checkpointing. We will show that this difference in granularity makes usual(More)
Beam is a program that synthesizes file trees from one or more source file trees. An instruction file contains the synthesis rules. The simplest form of a synthesis is making the destination tree an exact copy of a single source tree. If the destination tree already exists, it is verified for consistency with the sources and the synthesis rules. Updates(More)