Sciweavers

4731 search results - page 127 / 947
» Securing Interactive Programs
Sort
View
FC
2003
Springer
125views Cryptology» more  FC 2003»
14 years 2 months ago
Economics, Psychology, and Sociology of Security
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
Andrew M. Odlyzko
AUIC
2006
IEEE
14 years 3 months ago
Visualisations of execution traces (VET): an interactive plugin-based visualisation tool
An execution trace contains a description of everything that happened during an execution of a program. Execution traces are useful, because they can help software engineers under...
Mike McGavin, Tim Wright, Stuart Marshall
SOFTVIS
2003
ACM
14 years 2 months ago
Interactive Locality Optimization on NUMA Architectures
Optimizing the performance of shared-memory NUMA programs remains something of a black art, requiring that application writers possess deep understanding of their programs’ beha...
Tao Mu, Jie Tao, Martin Schulz, Sally A. McKee
PROVSEC
2009
Springer
14 years 3 months ago
Chosen-Ciphertext Secure RSA-Type Cryptosystems
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the standard model. We rely on instance-independence assu...
Benoît Chevallier-Mames, Marc Joye
ACSAC
2005
IEEE
14 years 2 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens