Sciweavers

8644 search results - page 59 / 1729
» On the Composition of Secure Systems
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
ACSAC
2008
IEEE
14 years 3 months ago
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System
Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Rob...
SP
2008
IEEE
14 years 3 months ago
Thinking Inside the Box: System-Level Failures of Tamper Proofing
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
WISTP
2007
Springer
14 years 3 months ago
An Information Flow Verifier for Small Embedded Systems
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-...
IEEEARES
2006
IEEE
14 years 3 months ago
Active/Active Replication for Highly Available HPC System Services
Christian Engelmann, Stephen L. Scott, Chokchai Le...