Sciweavers

2363 search results - page 99 / 473
» How Secure is RFID
Sort
View
203
Voted
AOSD
2011
ACM
14 years 8 months ago
Applying dependability aspects on top of "aspectized" software layers
Dynamic platforms where components can be loaded at runtime can introduce risks to applications stability if components are not previously known before deployment. It may be neede...
Kiev Gama, Didier Donsez
161
Voted
CSFW
2004
IEEE
15 years 8 months ago
Symbolic Model Checking the Knowledge of the Dining Cryptographers
This paper describes how symbolic techniques (in particular, OBDD's) may be used to to implement an algorithm for model checking specifications in the logic of knowledge for ...
Ron van der Meyden, Kaile Su
114
Voted
AOSD
2004
ACM
15 years 10 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
15 years 8 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
INFOCOM
2008
IEEE
15 years 11 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan