Sciweavers

2178 search results - page 121 / 436
» Toward Systemically Secure IT Architectures
Sort
View
CSFW
2012
IEEE
11 years 11 months ago
Information-Flow Security for a Core of JavaScript
—Tracking information flow in dynamic languages remains an important and intricate problem. This paper makes substantial headway toward understanding the main challenges and res...
Daniel Hedin, Andrei Sabelfeld
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
14 years 2 months ago
New Software Development Paradigms and Possible Adoption for Security
EGovernment would be a lot easier if it could be handled like eBusiness. Unfortunately there are organizational and legal obstacles that make it virtually impossible. The security...
Matthias Günter, Michael Gisler, Bianca von B...
IEPOL
2010
107views more  IEPOL 2010»
13 years 7 months ago
On the convergence of wired and wireless access network architectures
Wired and wireless access networks continue to evolve toward higher-capacity, multi-service systems. Recent wireless broadband networks such as 3G LTE and WiMax provide a general-...
William H. Lehr, John M. Chapin
JSAC
2006
100views more  JSAC 2006»
13 years 9 months ago
RFID security and privacy: a research survey
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help iden...
Ari Juels
CCS
2008
ACM
13 years 11 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...