Sciweavers

1019 search results - page 21 / 204
» Cryptographic Design Vulnerabilities
Sort
View
ICSE
2012
IEEE-ACM
12 years 12 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
HCI
2007
14 years 11 months ago
WATCH-OVER HMI for Vulnerable Road Users' Protection
WATCH-OVER is a European project, aiming at the enhancement of road safety and the impairment of traffic accidents involving vulnerable road users (VRUs), such as pedestrians, bicy...
Katrin Meinken, Roberto Montanari, Mark Fowkes, An...
FC
2000
Springer
106views Cryptology» more  FC 2000»
15 years 1 months ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz
86
Voted
IPPS
1998
IEEE
15 years 1 months ago
Measuring the Vulnerability of Interconnection Networks in Embedded Systems
Studies of the fault-tolerance of graphs have tended to largely concentrate on classical graph connectivity. This measure is very basic, and conveys very little information for des...
Vijay Lakamraju, Zahava Koren, Israel Koren, C. Ma...
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
15 years 2 months ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli