Sciweavers

2429 search results - page 170 / 486
» Using Aspects to Design a Secure System
Sort
View
CORR
2004
Springer
107views Education» more  CORR 2004»
13 years 9 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
ASM
2000
ASM
14 years 1 months ago
Report on a Practical Application of ASMs in Software Design
ASMs have been used at Siemens Corporate Technology to design a component in a software package called FALKO. Main purpose of FALKO is the construction and validation of timetables...
Egon Börger, Peter Päppinghaus, Joachim ...
ICRA
2000
IEEE
108views Robotics» more  ICRA 2000»
14 years 1 months ago
High Accuracy Navigation Using Laser Range Sensors in Outdoor Applications
This paper presents the design of a high accuracy outdoor navigation system based on standard dead reckoning sensors and laser range and bearing information. The data validation p...
José E. Guivant, Eduardo Mario Nebot, Stefa...
SOUPS
2009
ACM
14 years 3 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
SOUPS
2006
ACM
14 years 3 months ago
Seeing further: extending visualization as a basis for usable security
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...