Sciweavers

438 search results - page 2 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
DAC
2010
ACM
13 years 8 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
13 years 9 months ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
BMCBI
2010
127views more  BMCBI 2010»
13 years 4 months ago
PeptideMine - A webserver for the design of peptides for protein-peptide binding studies derived from protein-protein interactom
Background: Signal transduction events often involve transient, yet specific, interactions between structurally conserved protein domains and polypeptide sequences in target prote...
Khader Shameer, Lalima L. Madan, Shivamurthy Veera...
RE
2001
Springer
13 years 9 months ago
Deriving Safety Requirements Using Scenarios
Elicitation of requirements for safety critical aeroengine control systems is dependent on the capture of core design intent and the systematic derivation of requirements addressi...
Karen Allenby, Tim Kelly
AOSD
2004
ACM
13 years 10 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh