Abstract— We consider the level of information security provided by random linear network coding in network scenarios in which all nodes comply with the communication protocols y...
With the move to distributed, component based systems involving reuse of components and services, emergent, system-wide properties, including safety and security in particular, are...
Abstract. This paper presents a method for adding end-to-end verifiability to any optical-scan vote counting system. A serial number and set of letters, paired with every candidat...
Stefan Popoveniuc, Jeremy Clark, Richard Carback, ...
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
Security design patterns have been proposed recently as a tool for the improvement of software security during the architecture and design phases. Since the apperance of this rese...