Sciweavers

1580 search results - page 176 / 316
» Non-Interference Through Determinism
Sort
View
SOUPS
2006
ACM
14 years 4 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
14 years 4 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
APSEC
2005
IEEE
14 years 3 months ago
A Passive Test Oracle Using a Component's API
A test oracle is a mechanism that is used during testing to determine whether a software component behaves correctly or not. The test oracle problem is widely acknowledged in the ...
Rakesh Shukla, David A. Carrington, Paul A. Stroop...
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
14 years 3 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...
COLCOM
2005
IEEE
14 years 3 months ago
Location assisted routing for near-far effect mitigation in wireless networks
CDMA technology represents an attractive choice for various wireless ad hoc networks applications, due to its appealing properties, such as resistance to jamming and interference,...
Hassan Mahmood, Cristina Comaniciu