Sciweavers

8503 search results - page 296 / 1701
» Secure Software Architectures
Sort
View
133
Voted
CRYPTOLOGIA
2010
15 years 2 months ago
Internet Voting Protocol Based on Improved Implicit Security
This paper presents an improved protocol for Internet voting that allows recasting of ballots to eliminate voting errors, encourages early voting and provides an opportunity for c...
Abhishek Parakh, Subhash Kak
SIGSOFT
2002
ACM
16 years 5 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
15 years 4 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
OOPSLA
2005
Springer
15 years 10 months ago
MDAbench: a tool for customized benchmark generation using MDA
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performanc...
Liming Zhu, Yan Liu, Ian Gorton, Ngoc Bao Bui
ISI
2005
Springer
15 years 10 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...