Sciweavers

5843 search results - page 1087 / 1169
» Software Security in Practice
Sort
View
FC
2010
Springer
181views Cryptology» more  FC 2010»
14 years 29 days ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
SIGGRAPH
2010
ACM
14 years 28 days ago
Camera-less Smart Laser Projector
We introduce here our latest ‘smart laser projector’ prototype, i.e, a modified laser-based projector capable of augmenting all kind of surfaces while simultaneously using th...
Álvaro Cassinelli, Alexis Zerroug, Yoshihir...
DSN
2004
IEEE
14 years 24 days ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
ESAW
2000
Springer
14 years 20 days ago
Engineering Social Order
Social Order becomes a major problem in MAS and in computer mediated human interaction. After explaining the notions of Social Order and Social Control, I claim that there are mult...
Cristiano Castelfranchi
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
14 years 19 days ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...
« Prev « First page 1087 / 1169 Last » Next »