Sciweavers

2236 search results - page 165 / 448
» Secure Software Design in Practice
Sort
View
CCS
2009
ACM
15 years 11 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
CASES
2005
ACM
15 years 6 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
ADBIS
2005
Springer
138views Database» more  ADBIS 2005»
15 years 9 months ago
Software Quality and Life Cycles
Abstract. Quality of software has growing role of the modern software engineering work. Typical current trends in the development process are the dominating role of quality systems...
Hannu Jaakkola, Bernhard Thalheim
SIGSOFT
2010
ACM
15 years 1 months ago
The future of research in free/open source software development
Free/Open Source Software (FOSS) development is not the same an Software Engineering (SE). Why this is so is unclear and open to various interpretations. Both address the challeng...
Walt Scacchi
MMSEC
2006
ACM
115views Multimedia» more  MMSEC 2006»
15 years 10 months ago
An improvement to a biometric.based multimedia content protection scheme
A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve con...
Daniel Socek, Michal Sramka, Oge Marques, Dubravko...