Sciweavers

5843 search results - page 60 / 1169
» Software Security in Practice
Sort
View
CANS
2010
Springer
126views Cryptology» more  CANS 2010»
13 years 6 months ago
Towards Practical and Secure Coercion-Resistant Electronic Elections
Roberto Araujo, Narjes Ben Rajeb, Riadh Robbana, J...
ICSE
2007
IEEE-ACM
14 years 3 months ago
Good Practices for Educational Software Engineering Projects
Recent publications indicate the importance of software engineering in the computer science curriculum. In this paper, we present the final part of software engineering education ...
Louwarnoud van der Duim, Jesper Andersson, Marco S...
AC
1997
Springer
14 years 1 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
WETICE
2003
IEEE
14 years 2 months ago
Software Security Checklist for the Software Life Cycle
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development...
David P. Gilliam, Thomas L. Wolfe, Joseph S. Sheri...
SOUPS
2006
ACM
14 years 2 months ago
Aligning usability and security: a usability study of Polaris
Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Alexander J. DeWitt, Jasna Kuljis