Sciweavers

5843 search results - page 107 / 1169
» Software Security in Practice
Sort
View
CISSE
2008
Springer
14 years 5 days ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
ICSR
2011
Springer
13 years 1 months ago
Software Reuse and Safety
With the move to distributed, component based systems involving reuse of components and services, emergent, system-wide properties, including safety and security in particular, are...
William B. Frakes, John M. Favaro
EUROCRYPT
1999
Springer
14 years 2 months ago
Software Performance of Universal Hash Functions
Abstract. This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toepli...
Wim Nevelsteen, Bart Preneel
AGILEDC
2009
IEEE
14 years 5 months ago
Experiences Applying Agile Practices to Large Systems
The software engineering community has documented countless success stories where lean and agile software development practices have rescued failing projects and helped countless ...
Harry Koehnemann, Mark Coats
ICSE
2003
IEEE-ACM
14 years 10 months ago
Separation in Theory - Coordination in Practice
The lack of a common language and mutual understanding between the disciplines of systems development/software engineering and HCI does create challenges for both teaching and pra...
Torkil Clemmensen, Jacob Nørbjerg