Sciweavers

2236 search results - page 39 / 448
» Secure Software Design in Practice
Sort
View
COMPSAC
2009
IEEE
14 years 5 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...
COMPSAC
2000
IEEE
14 years 3 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
DRM
2004
Springer
14 years 4 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
VL
2010
IEEE
221views Visual Languages» more  VL 2010»
13 years 9 months ago
Sketching and Drawing in the Design of Open Source Software
In co-located software development, diagramming practices, such as sketching ideas out with a pen and paper, support the creative process and allow designers to shape, analyze, an...
Eunyoung Chung, Carlos Jensen, Koji Yatani, Victor...
WISEC
2009
ACM
14 years 5 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru