Sciweavers

722 search results - page 88 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
INFSOF
2006
159views more  INFSOF 2006»
14 years 12 months ago
Essential communication practices for Extreme Programming in a global software development team
We conducted an industrial case study of a distributed team in the USA and the Czech Republic that used Extreme Programming. Our goal was to understand how this globally-distribut...
Lucas Layman, Laurie Williams, Daniela Damian, Hyn...
STORAGESS
2005
ACM
15 years 5 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
CORR
2010
Springer
60views Education» more  CORR 2010»
14 years 12 months ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
14 years 9 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
CSCW
2002
ACM
14 years 11 months ago
Collaboration as an Activity Coordinating with Pseudo-Collective Objects
A coalition is a collaborative pattern in which people must work together to accomplish a task, but where organizational constraints stand in the way of their making use of the co...
David Zager