Sciweavers

14850 search results - page 102 / 2970
» The Security of
Sort
View
SIS
2004
15 years 5 months ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...
CCS
2008
ACM
15 years 5 months ago
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
David Dagon, Manos Antonakakis, Paul Vixie, Tatuya...
CCS
2010
ACM
15 years 4 months ago
Attacking and fixing PKCS#11 security tokens
Matteo Bortolozzo, Matteo Centenaro, Riccardo Foca...
IMCS
2008
58views more  IMCS 2008»
15 years 4 months ago
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer
Purpose
Yoones Asgharzadeh Sekhavat, Mohammad Fathian
CCS
2011
ACM
14 years 4 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...