Sciweavers

38 search results - page 5 / 8
» Reflections on aspects and configurable protocols
Sort
View
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
CANDC
2009
ACM
14 years 2 months ago
BodyDaemon
This paper introduces the idea of actualizing theory in the context of artistic practice. We describe the project BodyDaemon and its function as a technology-based artwork that is...
Carlos Castellanos, Thecla Schiphorst
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 7 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
IEEECIT
2010
IEEE
13 years 5 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
MOBIHOC
2002
ACM
14 years 7 months ago
Routing performance in the presence of unidirectional links in multihop wireless networks
We examine two aspects concerning the influence of unidirectional links on routing performance in multihop wireless networks. In the first part of the paper, we evaluate the benef...
Mahesh K. Marina, Samir Ranjan Das