Sciweavers

3003 search results - page 82 / 601
» Software Security: Building Security In
Sort
View
ESSOS
2010
Springer
14 years 4 months ago
Model-Driven Security Policy Deployment: Property Oriented Approach
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
ADAEUROPE
2006
Springer
14 years 1 months ago
Secure Execution of Computations in Untrusted Hosts
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
ICFEM
2009
Springer
13 years 5 months ago
Improving Automatic Verification of Security Protocols with XOR
Abstract. K
Xihui Chen, Ton van Deursen, Jun Pang
IEEEARES
2008
IEEE
14 years 2 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...