Sciweavers

1875 search results - page 91 / 375
» Modeling the Security of Steganographic Systems
Sort
View
114
Voted
ACSAC
2001
IEEE
15 years 4 months ago
Information Flow Analysis of Component-Structured Applications
Software component technology facilitates the costeffective development of specialized applications. Nevertheless, due to the high number of principals involved in a component-str...
Peter Herrmann
88
Voted
FC
2004
Springer
78views Cryptology» more  FC 2004»
15 years 6 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
80
Voted
ISPEC
2005
Springer
15 years 6 months ago
An Open Approach for Designing Secure Electronic Immobilizers
Abstract. The automotive industry has developed electronic immobilizers to reduce the number of car thefts since the mid nineties. However, there is not much information on the cur...
Kerstin Lemke, Ahmad-Reza Sadeghi, Christian St&uu...
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
15 years 6 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...
97
Voted
SPW
1999
Springer
15 years 5 months ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson