Sciweavers

364 search results - page 13 / 73
» E-Voting System Security Optimization
Sort
View
CORR
2011
Springer
221views Education» more  CORR 2011»
13 years 3 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
ECOOPW
2006
Springer
14 years 3 days ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo
EUROPKI
2004
Springer
14 years 1 months ago
A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions
The use of PKI in large scale environments suffers some inherent problems concerning the options to adopt for the optimal cost-centered operation of the system. In this paper a Mar...
Agapios N. Platis, Costas Lambrinoudakis, Assimaki...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
Gildas Avoine, Aslan Tchamkerten
ACSAC
2007
IEEE
14 years 13 days ago
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection
This paper provides a general and comprehensive approach to implementing misuse detection on expert systems and an in-depth analysis of the effectiveness of the optimization strat...
Michael Meier, Ulrich Flegel, Sebastian Schmerl