Sciweavers

8503 search results - page 285 / 1701
» Secure Software Architectures
Sort
View
DIM
2007
ACM
15 years 8 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
77
Voted
DAC
2002
ACM
16 years 5 months ago
System design methodologies for a wireless security processing platform
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...
CODES
2007
IEEE
15 years 11 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
153
Voted
WOSP
2005
ACM
15 years 10 months ago
Performance by unified model analysis (PUMA)
Evaluation of non-functional properties of a design (such as performance, dependability, security, etc.) can be enabled by design annotations specific to the property to be evalua...
C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan...
135
Voted
OOPSLA
2004
Springer
15 years 10 months ago
C-SAW and genAWeave: a two-level aspect weaving toolsuite
This demonstration will feature overviews of the C-SAW and GenAWeave projects. The first half of the presentation will introduce the concept of two-level aspect weaving, which uni...
Jeffrey G. Gray, Jing Zhang, Suman Roychoudhury, I...