Sciweavers

129 search results - page 8 / 26
» An Open Approach for Designing Secure Electronic Immobilizer...
Sort
View
ISJGP
2010
13 years 5 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
ECMAST
1999
Springer
166views Multimedia» more  ECMAST 1999»
14 years 22 days ago
The CATI Project: Charging and Accounting Technology for the Internet
The objectives of the CATI project (Charging and Accounting Technology for the Internet) include the design, implementation, and evaluation of charging and accounting mechanisms f...
Burkhard Stiller, Torsten Braun, Manuel Günte...
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
14 years 19 days ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
CCS
2009
ACM
14 years 13 days ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
VOTEID
2007
Springer
14 years 2 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...