Sciweavers

615 search results - page 6 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
IEEESP
2007
49views more  IEEESP 2007»
13 years 7 months ago
A Metrics Framework to Drive Application Security Improvement
Elizabeth A. Nichols, Gunnar Peterson
EUROPKI
2004
Springer
14 years 25 days ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
WISTP
2010
Springer
14 years 2 months ago
MoteAODV - An AODV Implementation for TinyOS 2.0
Reliable, inexpensive, on-the-fly networks can be established using mobile ad-hoc network (MANET) technology. Such networks can be used in a wide variety of scenarios ranging from...
Werner Backes, Jared Cordasco
RECOSOC
2007
115views Hardware» more  RECOSOC 2007»
13 years 9 months ago
Self-adaptive Security at Application Level: a Proposal
—Self-adaptive systems have the ability to adapt themselves to mutating external or internal conditions without requesting any intervention of the user; the security of such syst...
Alberto Ferrante, Antonio Vincenzo Taddeo, Mariagi...
IEEEARES
2007
IEEE
14 years 1 months ago
Secure Software Development through Coding Conventions and Frameworks
It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that ther...
Takao Okubo, Hidehiko Tanaka