Sciweavers

58 search results - page 4 / 12
» Requirements in the wild: How small companies do it
Sort
View
IACR
2011
132views more  IACR 2011»
13 years 11 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
96
Voted
HCI
2007
15 years 1 months ago
A Qualitative Oriented Study About IT Procurement Processes: Comparison of 4 European Countries
This study shows that in a qualitative study a small sample size is sufficient to gain interesting results and show differences between the procurement of IT services in different ...
Michael Schiessl, Sabrina Duda
LISA
2001
15 years 1 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
82
Voted
CHI
2001
ACM
16 years 14 days ago
Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications
Despite experience, many users do not make efficient use of complex computer applications. We argue that this is caused by a lack of strategic knowledge that is difficult to acqui...
Suresh K. Bhavnani, Frederick Reif, Bonnie E. John
91
Voted
RE
2006
Springer
15 years 1 days ago
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling
In goal-oriented requirements engineering (GORE), one usually proceeds from a goal analysis to a requirements specification, usually of IT systems. In contrast, we consider the us...
Jaap Gordijn, Michaël Petit, Roel Wieringa