Sciweavers

2236 search results - page 33 / 448
» Secure Software Design in Practice
Sort
View
AFRIGRAPH
2004
ACM
14 years 1 months ago
Designing a VR interaction authoring tool using constructivist practices
This paper describes the process of designing an authoring tool for virtual environments, using constructivist principles. The focus of the tool is on helping novice designers wit...
Cara Winterbottom, Edwin H. Blake
ESAW
2007
Springer
14 years 2 months ago
Multi-agent Simulation to Implementation: A Practical Engineering Methodology for Designing Space Flight Operations
OCAMS is a practical engineering application of multi-agent systems technology, involving redesign of the tools and practices in a complex, distributed system. OCAMS is designed to...
William J. Clancey, Maarten Sierhuis, Chin Seah, C...
FOSSACS
2006
Springer
14 years 5 days ago
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Abstract. Web services are an important series of industry standards for adding semantics to web-based and XML-based communication, in particular among enterprises. Like the entire...
Michael Backes, Sebastian Mödersheim, Birgit ...
CCS
2010
ACM
13 years 8 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
ACISP
2003
Springer
14 years 1 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon