Sciweavers

949 search results - page 155 / 190
» Design methods for security and trust
Sort
View
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 9 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
TC
1998
15 years 3 months ago
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
—The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed a...
Jean-Charles Fabre, Tanguy Pérennou
UIALL
2004
Springer
15 years 9 months ago
A Framework for Context-Sensitive Coordination of Human Interruptions in Human-Computer Interaction
Abstract. Recent trends in software development directed toward intelligence, distribution, and mobility need to be followed by an increased sophistication in user interface design...
Sonja Gievska, John L. Sibert
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
15 years 6 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
LISA
2001
15 years 5 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman