Sciweavers

129 search results - page 19 / 26
» An Open Approach for Designing Secure Electronic Immobilizer...
Sort
View
CSFW
2012
IEEE
11 years 11 months ago
Discovering Concrete Attacks on Website Authorization by Formal Analysis
—Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social ...
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffe...
MODELS
2007
Springer
14 years 2 months ago
Modeling Time(s)
Abstract. Time and timing features are an important aspect of modern electronic systems, often of embedded nature. We argue here that in early design phases, time is often of logic...
Charles André, Frédéric Malle...
CCS
2003
ACM
14 years 1 months ago
The blocker tag: selective blocking of RFID tags for consumer privacy
We propose the use of “selective blocking” by “blocker tags” as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or...
Ari Juels, Ronald L. Rivest, Michael Szydlo
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
14 years 1 months ago
Great principles in computing curricula
The nearly three dozen core technologies of computing sit in a simple framework defined by great principles and by computing practices. The great principles are of two kinds, mech...
Peter J. Denning
IEEEAMS
2003
IEEE
14 years 1 months ago
On Conditions for Self-Healing in Distributed Software Systems
This paper attempts to identify one of the necessary conditions for self-healing, or self-repair, in complex systems, and to propose means for satisfying this condition in heterog...
Naftaly H. Minsky