Sciweavers

410 search results - page 39 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
FM
2003
Springer
104views Formal Methods» more  FM 2003»
14 years 27 days ago
Proving the Shalls
Incomplete, inaccurate, ambiguous, and volatile requirements have plagued the software industry since its inception. The convergence of model-based development and formal methods o...
Steven P. Miller, Alan C. Tribble, Mats Per Erik H...
CHI
2006
ACM
14 years 8 months ago
Reality testing: HCI challenges in non-traditional environments
Non-traditional environments often change rapidly without forewarning, are difficult or impossible to control, and have other environmental and operational constraints that cannot...
Gisele Bennett, Gitte Lindgaard, Bruce Tsuji, Kay ...
CCS
2009
ACM
14 years 2 months ago
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate v...
Thomas Ristenpart, Eran Tromer, Hovav Shacham, Ste...
FC
2005
Springer
120views Cryptology» more  FC 2005»
14 years 1 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah