Sciweavers

4870 search results - page 189 / 974
» Challenges of component-based development
Sort
View
FAC
2008
67views more  FAC 2008»
15 years 3 months ago
Specification, proof, and model checking of the Mondex electronic purse using RAISE
This paper describes how the communication protocol of Mondex electronic purses can be specified and verified against desired security properties. The specification is developed by...
Chris George, Anne Elisabeth Haxthausen
IJEH
2008
82views more  IJEH 2008»
15 years 3 months ago
Personal identity verification for regional emergency workers
: South Central Texas emergency planners have organised a regional Personal Identity Verification (PIV) project for hospital and emergency workers. This paper describes the develop...
Alexander McLeod Jr., Eric Epley, Rasa Silenas
FECS
2010
1324views Education» more  FECS 2010»
15 years 1 months ago
A Case Study in the Design of a Restaurant Management System
Teaching software engineering at the undergraduate level is an exciting and challenging undertaking. Students come to software engineering with a variety of technical and sift ski...
Wesley Williams, Devon Simmonds
RFIDSEC
2010
15 years 1 months ago
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensu...
Gildas Avoine, Benjamin Martin 0002, Tania Martin
ECBS
2008
IEEE
110views Hardware» more  ECBS 2008»
15 years 10 months ago
Goal-Based Modeling of Dynamically Adaptive System Requirements
Self-adaptation is emerging as an increasingly important capability for many applications, particularly those deployed in dynamically changing environments, such as ecosystem moni...
Heather Goldsby, Peter Sawyer, Nelly Bencomo, Bett...