Sciweavers

2904 search results - page 293 / 581
» Internet Infrastructure Security
Sort
View
DAC
1998
ACM
16 years 6 months ago
WELD - An Environment for Web-based Electronic Design
Increasing size and geographical separation of design data and teams has created a need for a network-based electronic design environment that is scaleable, adaptable, secure, hig...
Francis L. Chan, Mark D. Spiller, A. Richard Newto...
ESOP
2010
Springer
16 years 2 months ago
Verifying a Compiler for Java Threads
Abstract. A verified compiler is an integral part of every security infrastructure. Previous work has come up with formal semantics for sequential and concurrent variants of Java a...
Andreas Lochbihler
IEEEIAS
2008
IEEE
15 years 11 months ago
Abusing SIP Authentication
The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. ...
Humberto J. Abdelnur, Tigran Avanesov, Michaë...
POLICY
2007
Springer
15 years 11 months ago
Towards Privacy-Aware Handling of Authorizations
Privacy issues have hindered centralised authentication approaches from being adopted by a wide range of users. This also applies to authorizations which suffer from privacy probl...
Wolfgang Dobmeier, Günther Pernul
112
Voted
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
15 years 11 months ago
Reorganizing Government: Bhutan Visa Online
Centralized government document infrastructure and a policy commitment to transform the tourism sector to a more vivid and efficient business sector works as drivers for implement...
Kim Viborg Andersen, Helle Zinner Henriksen