Sciweavers

2363 search results - page 62 / 473
» How Secure is RFID
Sort
View
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
15 years 6 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
CADE
2005
Springer
16 years 4 months ago
Deduction with XOR Constraints in Security API Modelling
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is...
Graham Steel
FOSAD
2000
Springer
15 years 8 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
DRMTICS
2005
Springer
15 years 10 months ago
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law - the so called anti-circumvention provisions....
Brian Fitzgerald
PET
2010
Springer
15 years 8 months ago
How Unique Is Your Web Browser?
We investigate the degree to which modern web browsers are subject to “device fingerprinting” via the version and configuration information that they will transmit to website...
Peter Eckersley