Sciweavers

331 search results - page 47 / 67
» Assessing the Risk of IT Outsourcing
Sort
View
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
15 years 5 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
78
Voted
IEEEARES
2007
IEEE
15 years 5 months ago
Collection of Quantitative Data on Security Incidents
Quantitative data about security threats is a precondition for a precise assessment of security risks and consequently for an efficient management of information security. Curren...
Thomas Nowey, Hannes Federrath
QUATIC
2007
IEEE
15 years 5 months ago
Modeling the Experimental Software Engineering Process
– Systematic reviews on software engineering literature have shown an insufficient experimental validation of claims, when compared to the standard practice in other wellestablis...
Miguel Goulão, Fernando Brito e Abreu
ECTEL
2007
Springer
15 years 5 months ago
CAMEL: Taking the Technology Enhanced Learning Journey without Reinventing the Wheel
Projects involving technology are notoriously dogged with difficulties and a number of lessons can be learned. Rather than detail examples from particular TEL projects, the author ...
Gill Ferrell
IPPS
2005
IEEE
15 years 4 months ago
Proactive Fault Handling for System Availability Enhancement
Proactive fault handling combines prevention and repair actions with failure prediction techniques. We extend the standard availability formula by five key measures: (1) precisio...
Felix Salfner, Miroslaw Malek