Sciweavers

1116 search results - page 48 / 224
» Secure Mediation: Requirements and Design
Sort
View
ISSE
2010
13 years 7 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
ACSAC
2009
IEEE
14 years 4 months ago
The Design of a Trustworthy Voting System
– After the voting debacle in the Florida Presidential election of 2000 with its now-fabled hanging chads and pregnant chads, many voting jurisdictions turned to electronic votin...
Nathanael Paul, Andrew S. Tanenbaum
DATE
2008
IEEE
140views Hardware» more  DATE 2008»
14 years 3 months ago
FPGA Design for Algebraic Tori-Based Public-Key Cryptography
Algebraic torus-based cryptosystems are an alternative for Public-Key Cryptography (PKC). It maintains the security of a larger group while the actual computations are performed i...
Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid ...
AAAI
1996
13 years 10 months ago
The NASA Personnel Security Processing Expert System
The NASA Personnel Security Processing Expert System is a tool that automatically determines the appropriate personnel background investigation required for a civil servant or con...
David Silberberg, Robert Thomas
CARDIS
2008
Springer
146views Hardware» more  CARDIS 2008»
13 years 11 months ago
Provably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device. Our goal is...
Mike Burmester, Breno de Medeiros, Rossana Motta