Sciweavers

739 search results - page 49 / 148
» Security Challenges in Cloud Computing
Sort
View
EUROSEC
2010
ACM
15 years 9 months ago
The robustness of a new CAPTCHA
CAPTCHA is a standard security technology that presents tests to tell computers and humans apart. In this paper, we examine the security of a new CAPTCHA that was deployed until v...
Ahmad Salah El Ahmad, Jeff Yan, Lindsay Marshall
CCS
2007
ACM
15 years 10 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
ECOOPW
2006
Springer
15 years 7 months ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo
CN
1999
88views more  CN 1999»
15 years 3 months ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 9 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...