Sciweavers

2236 search results - page 178 / 448
» Secure Software Design in Practice
Sort
View
CCS
2008
ACM
15 years 6 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 9 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
FPL
2006
Springer
120views Hardware» more  FPL 2006»
15 years 7 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
PUC
2000
94views more  PUC 2000»
15 years 3 months ago
Places to Stay on the Move: Software Architectures for Mobile User Interfaces
abstract Alan Dix Devina Ramduny Tom Rodden, Nigel Davies. aQtive limited and Staffordshire University Staffordshire University Lancaster University http://www.hiraeth.com/alan/top...
Alan J. Dix, Devina Ramduny, Tom Rodden, Nigel Dav...
136
Voted
PET
2007
Springer
15 years 10 months ago
Pairing-Based Onion Routing
Abstract. This paper presents a novel use of pairing-based cryptography to improve circuit construction in onion routing anonymity networks. Instead of iteratively and interactivel...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg