Sciweavers

236 search results - page 5 / 48
» Can You Trust Software Capability Evaluations
Sort
View
SEKE
2007
Springer
14 years 4 months ago
REM4j - A Framework for Measuring the Reverse Engineering Capability of UML CASE Tools
Reverse Engineering is becoming increasingly important in the software development world today as many organizations are battling to understand and maintain old legacy systems. To...
Steven Kearney, James F. Power
ACSAC
2005
IEEE
14 years 3 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
WSC
1997
13 years 11 months ago
Before Dynamic Simulation: Systematic Layout Design from Scratch
Excellent production design and planning depends on accurate simulation of a high quality layout. A good layout project will always begin with an analysis of the production volume...
David P. Sly
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 4 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
WOWMOM
2006
ACM
119views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
Credentials and Beliefs in Remote Trusted Platforms Attestation
— Remote attestation in trusted computing is about the ability of a local platform to authenticate the hardware and the software stack running on a remote trusted platform. We sa...
Andrea Bottoni, Gianluca Dini, Evangelos Kranakis