Sciweavers

949 search results - page 164 / 190
» Design methods for security and trust
Sort
View
ICCSA
2005
Springer
15 years 9 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
127
Voted
AIS
2004
Springer
15 years 9 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
OOPSLA
2004
Springer
15 years 9 months ago
An aspect-oriented generative approach
Generative programming and aspect-oriented software development have been proposed over the last years aiming at increasing maintainability and reusability of software systems. Wh...
Uirá Kulesza, Alessandro F. Garcia, Carlos ...
COMPSAC
2002
IEEE
15 years 9 months ago
Constructing an EJB Application in a WFMS
A workflow system provides enterprises the automatic and paperless process management. The idea of Enterprise JavaBeans (EJB) is to utilize components from various vendors to cons...
Jian-Wei Wang, Ta-Chun Lin, Hwai-Jong Hsu, Feng-Ji...
FSE
1997
Springer
112views Cryptology» more  FSE 1997»
15 years 8 months ago
A Family of Trapdoor Ciphers
This paper presents several methods to construct trapdoor block ciphers. A trapdoor cipher contains some hidden structure; knowledge of this structure allows an attacker to obtain ...
Vincent Rijmen, Bart Preneel