Sciweavers

1317 search results - page 45 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
15 years 2 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
13 years 12 months ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
PLDI
2006
ACM
15 years 10 months ago
Practical dynamic software updating for C
Software updates typically require stopping and restarting an application, but many systems cannot afford to halt service, or would prefer not to. Dynamic software updating (DSU) ...
Iulian Neamtiu, Michael W. Hicks, Gareth Stoyle, M...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 10 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ICRA
2006
IEEE
76views Robotics» more  ICRA 2006»
15 years 10 months ago
A Robotized Positioning Platform guided by Computed Tomography: Practical Issues and Evaluation
Abstract— Medical robotics is a field where dedicated mechanisms have an increasing importance. The strong operating room constraints, both medical and practical, lead to heavil...
Benjamin Maurin, Bernard Bayle, Jacques Gangloff, ...