Sciweavers

8689 search results - page 1438 / 1738
» Software: hard data
Sort
View
CCS
2004
ACM
15 years 10 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
EMSOFT
2004
Springer
15 years 10 months ago
Garbage collection for embedded systems
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
David F. Bacon, Perry Cheng, David Grove
151
Voted
ER
2004
Springer
167views Database» more  ER 2004»
15 years 10 months ago
A CASE Tool for Geographic Database Design Supporting Analysis Patterns
: This paper describes the development of an open source CASE tool, the ArgoCASEGEO, and its modular architecture. The ArgoCASEGEO allows the geographic database modelling based on...
Jugurta Lisboa Filho, Victor de Freitas Sodr&eacut...
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 10 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
HICSS
2003
IEEE
131views Biometrics» more  HICSS 2003»
15 years 9 months ago
An ERP Maintenance Model
Enterprise resource planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Annual maintenance costs approximate 25% of initial ...
Celeste See Pui Ng, Guy G. Gable, Taizan Chan
« Prev « First page 1438 / 1738 Last » Next »