Sciweavers

3003 search results - page 148 / 601
» Software Security: Building Security In
Sort
View
FC
2010
Springer
196views Cryptology» more  FC 2010»
14 years 2 months ago
Secure Multiparty AES
Abstract We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expe...
Ivan Damgård, Marcel Keller
WSC
2008
14 years 15 days ago
Dynamic security: An agent-based model for airport defense
The Department of Homeland Security (DHS) shifted the focus of airport security in 2004 to incorporate the need to continuously and rapidly adapt security to shifting threats. MIT...
William E. Weiss
COMPSAC
2009
IEEE
14 years 2 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
CCS
2009
ACM
14 years 5 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
ESWA
2011
473views Database» more  ESWA 2011»
13 years 1 months ago
A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards
Abstract: The security of a dynamic ID-based remote user authentication scheme for multiserver environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-...
Cheng-Chi Lee, Tsung-Hung Lin, Rui-Xiang Chang