Sciweavers

801 search results - page 7 / 161
» Robust Nonproprietary Software
Sort
View
TRUST
2010
Springer
15 years 2 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
ATAL
2003
Springer
15 years 2 months ago
Robust software via agent-based redundancy
This paper describes how multiagent systems can be used to achieve robust software, one of the major goals of software engineering. The paper first positions itself within the sof...
Michael N. Huhns, Vance T. Holderfield, Rosa Laura...
ACISP
2003
Springer
15 years 2 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
COMSWARE
2007
IEEE
15 years 1 months ago
Robust and Efficient Software Management in Sensor Networks
Software deployment and updating of deployed code is a critical topic in the area of wireless sensor networks (WSN). Reasons are unreliable network connectivity, resource limitatio...
Wolfgang Schröder-Preikschat, Rüdiger Ka...
IAT
2005
IEEE
15 years 3 months ago
Multiagent Reputation Management to Achieve Robust Software Using Redundancy
This paper explains the building of robust software using multiagent reputation. One of the major goals of software engineering is to achieve robust software. Our hypothesis is th...
Rajesh Turlapati, Michael N. Huhns