Sciweavers

3003 search results - page 59 / 601
» Software Security: Building Security In
Sort
View
ACISP
2004
Springer
14 years 1 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
CCS
2004
ACM
14 years 1 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
ESSOS
2010
Springer
14 years 4 months ago
Secure Code Generation for Web Applications
Martin Johns, Christian Beyerlein, Rosemaria Giese...
CISIS
2009
IEEE
14 years 2 months ago
A Secure RFID Authentication Protocol with Low Communication Cost
Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko M...
ADAEUROPE
2009
Springer
14 years 2 months ago
Validating Safety and Security Requirements for Partitioned Architectures
Julien Delange, Laurent Pautet, Peter H. Feiler