Sciweavers

12478 search results - page 4 / 2496
» Secure Interaction Design
Sort
View
SPW
1997
Springer
13 years 11 months ago
Protocol Interactions and the Chosen Protocol Attack
There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions betw...
John Kelsey, Bruce Schneier, David Wagner
CHI
2007
ACM
14 years 7 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
CCS
2004
ACM
14 years 24 days ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
IJSN
2007
120views more  IJSN 2007»
13 years 7 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
LAWEB
2005
IEEE
14 years 29 days ago
Web Development Evolution: The Assimilation of Web Engineering Security
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security iss...
William Bradley Glisson, Ray Welland