Sciweavers

1106 search results - page 203 / 222
» Automated Design of Security Protocols
Sort
View
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
14 years 4 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
IPPS
2007
IEEE
14 years 4 months ago
Middleware and Performance Issues for Computational Finance Applications on Blue Gene/L
We discuss real-world case studies involving the implementation of a web services middleware tier for the IBM Blue Gene/L supercomputer to support financial business applications...
Thomas Phan, Ramesh Natarajan, Satoki Mitsumori, H...
ICEBE
2005
IEEE
165views Business» more  ICEBE 2005»
14 years 3 months ago
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems
Service-Oriented Computing (SOC) and Web Services (WS) provide a flexible computing platform for electronic business and commerce. Introducing policy-based computing to service-or...
Wei-Tek Tsai, Xinxin Liu, Yinong Chen
EIT
2008
IEEE
13 years 11 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
TIM
2011
172views more  TIM 2011»
13 years 4 months ago
Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...