Sciweavers

5484 search results - page 14 / 1097
» Almost-Everywhere Secure Computation
Sort
View
94
Voted
OOPSLA
2010
Springer
14 years 11 months ago
Patterns and statistical analysis for understanding reduced resource computing
Martin C. Rinard, Henry Hoffmann, Sasa Misailovic,...
SIGCSE
2004
ACM
95views Education» more  SIGCSE 2004»
15 years 7 months ago
Cryptography and computer security for undergraduates
The panel discusses solutions to the problem of computer security education. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: security and protection. E...
Paul De Palma, Charles Frank, Suzanne E. Gladfelte...
100
Voted
PDCAT
2005
Springer
15 years 7 months ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
99
Voted
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 8 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...