Sciweavers

3003 search results - page 64 / 601
» Software Security: Building Security In
Sort
View
ASIACRYPT
2001
Springer
13 years 11 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
ICSEA
2007
IEEE
14 years 2 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su
COMCOM
2000
105views more  COMCOM 2000»
13 years 7 months ago
Security broker for multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement a number of security services such as authentication, key exchange and real-time e...
Aura Ganz, Se Hyun Park, Zvi Ganz
KBSE
2008
IEEE
14 years 2 months ago
Mashups and modularity: Towards secure and reusable web applications
The software industry is currently experiencing a paradigm shift towards web-based software. We argue that web technologies should evolve in a direction that would allow the devel...
Antero Taivalsaari, Tommi Mikkonen
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
14 years 1 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano