Sciweavers

3482 search results - page 53 / 697
» Designing for security
Sort
View
IICAI
2003
13 years 10 months ago
Biometric Security Systems: Fingerprint and Speech Technology
: This paper deals with the design of a biometric security system based upon the fingerprint and speech technology. In the first chapter there are the biometric security systems an...
Filip Orság, Martin Drahanský
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
14 years 1 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
IJNSEC
2008
118views more  IJNSEC 2008»
13 years 9 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
13 years 10 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
DAC
2007
ACM
14 years 24 days ago
Trusted Design in FPGAs
Using FPGAs, a designer can separate the design process from the manufacturing flow. Therefore, the owner of a sensitive design need not expose the design to possible theft and ta...
Steven Trimberger