Sciweavers

2236 search results - page 177 / 448
» Secure Software Design in Practice
Sort
View
APCCM
2006
15 years 5 months ago
Postmodern prospects for conceptual modelling
A number of recent developments in software engineering -- from agile methods to aspect-oriented programming to design patterns to good enough software -- share a number of common...
James Noble, Robert Biddle
CCS
2007
ACM
15 years 10 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
15 years 9 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
COMPSAC
2005
IEEE
15 years 9 months ago
Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of auton...
Atilla Elçi, Behnam Rahnama
132
Voted
MIDDLEWARE
2004
Springer
15 years 9 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov