Sciweavers

8644 search results - page 59 / 1729
» On the Composition of Secure Systems
Sort
View
SOUPS
2009
ACM
15 years 11 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
ACSAC
2008
IEEE
15 years 11 months ago
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System
Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Rob...
SP
2008
IEEE
15 years 11 months ago
Thinking Inside the Box: System-Level Failures of Tamper Proofing
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
WISTP
2007
Springer
15 years 10 months ago
An Information Flow Verifier for Small Embedded Systems
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-...
IEEEARES
2006
IEEE
15 years 10 months ago
Active/Active Replication for Highly Available HPC System Services
Christian Engelmann, Stephen L. Scott, Chokchai Le...