Sciweavers

3420 search results - page 91 / 684
» A Language-Based Approach to Security
Sort
View
116
Voted
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
15 years 9 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
119
Voted
ISSE
2010
15 years 2 months ago
An approach to applying SOFL for agile process and its application in developing a test support tool
Structured Object-Oriented Formal Language (SOFL) is a representative formal engineering method for software development. It offers a three-step specification approachtoconstructi...
Shaoying Liu
151
Voted
DEXAW
2007
IEEE
124views Database» more  DEXAW 2007»
15 years 5 months ago
A Process Improvement Approach to Improve Web Form Design and Usability
The research presented in this paper is an examination of how the concepts used in process improvement may be applied to a web form to improve design and usability. Although much ...
Sean Thompson, Torab Torabi
131
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
165
Voted
CBSE
2011
Springer
14 years 3 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...