Sciweavers

1019 search results - page 70 / 204
» Cryptographic Design Vulnerabilities
Sort
View
158
Voted
SLIP
2006
ACM
15 years 10 months ago
A tale of two nets: studies of wirelength progression in physical design
At every stage in physical design, engineers are faced with many different objectives and tools to develop, optimize, and evaluate their design. Each choice of a tool or an objec...
Andrew B. Kahng, Sherief Reda
229
Voted
POPL
2005
ACM
16 years 4 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
EGOV
2007
Springer
15 years 10 months ago
Towards a Methodology for Designing E-Government Control Procedures
The EU is currently modernizing customs legislation and practices. Main pillars in the new vision are an intensive use of IT (Customs becomes eCustoms), partnerships between Custom...
Ziv Baida, Jianwei Liu, Yao-Hua Tan
141
Voted
CCS
2008
ACM
15 years 6 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
129
Voted
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 10 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...