Sciweavers

339 search results - page 29 / 68
» The Evolution of RFID Security
Sort
View
123
Voted
OOPSLA
2009
Springer
15 years 8 months ago
Software evolution and the moving picture metaphor
Software systems evolve over time. Currently we do not do a good job of documenting this evolution. This essay discusses the need to better document software evolution and introdu...
Mark Mahoney
163
Voted
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
15 years 9 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
128
Voted
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
15 years 4 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
66
Voted
HICSS
2008
IEEE
104views Biometrics» more  HICSS 2008»
15 years 10 months ago
The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users
M. Eric Johnson, Dan McGuire, Nicholas D. Willey
149
Voted
CODASPY
2011
14 years 7 months ago
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures
Kari Kostiainen, Elena Reshetova, Jan-Erik Ekberg,...