Sciweavers

14850 search results - page 102 / 2970
» The Security of
Sort
View
SIS
2004
13 years 11 months ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...
CCS
2008
ACM
13 years 11 months ago
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
David Dagon, Manos Antonakakis, Paul Vixie, Tatuya...
CCS
2010
ACM
13 years 10 months ago
Attacking and fixing PKCS#11 security tokens
Matteo Bortolozzo, Matteo Centenaro, Riccardo Foca...
IMCS
2008
58views more  IMCS 2008»
13 years 10 months ago
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer
Purpose
Yoones Asgharzadeh Sekhavat, Mohammad Fathian
CCS
2011
ACM
12 years 10 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...