Sciweavers

577 search results - page 63 / 116
» An enterprise assurance framework
Sort
View
ESORICS
2009
Springer
14 years 10 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
SACI
2007
IEEE
14 years 4 months ago
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java
— an application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java Media Framework to send audio and vid...
Bogdan Groza, Dorina Petrica, Simona Barbu, Marian...
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
14 years 2 months ago
Monitoring Software Requirements Using Instrumented Code
Ideally, software is derived from requirements whose properties have been established as good. However, it is difficult to define and analyze requirements. Moreover, derivation of...
William N. Robinson
HT
1997
ACM
14 years 2 months ago
Improving the Usability of Hypertext Courseware through Adaptive Linking
Hypertext is being used more and more for on-line course texts. But the navigational freedom offered by a rich link structure is a burdon for students who need guidance throughout...
Licia Calvi, Paul De Bra
SIGIR
2010
ACM
14 years 1 months ago
Discriminative models of integrating document evidence and document-candidate associations for expert search
Generative models such as statistical language modeling have been widely studied in the task of expert search to model the relationship between experts and their expertise indicat...
Yi Fang, Luo Si, Aditya P. Mathur