Sciweavers

2236 search results - page 264 / 448
» Secure Software Design in Practice
Sort
View
IACR
2011
192views more  IACR 2011»
14 years 2 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 10 months ago
Compositional Variability - Concepts and Patterns
Most software-intensive systems rely on a componentbased design and are therefore made up of encapsulated structural units which are hierarchically composed of one another. In thi...
Mark-Oliver Reiser, Ramin Tavakoli Kolagari, Matth...
ECBS
2007
IEEE
135views Hardware» more  ECBS 2007»
15 years 9 months ago
Introducing Impact Analysis for Architectural Decisions
Architectural quality constitutes a critical factor for contemporary software systems, especially because of their size and the needs for frequent, quick changes. For success-crit...
Matthias Riebisch, Sven Wohlfarth
IMSCCS
2006
IEEE
15 years 9 months ago
An Adaptive Agent-Based Network for Distributed Component Repositories
The application of component repository has become more and more popular in the practice of component-based software development. Most of the repositories are physically isolated ...
Yunjiao Xue, Leqiu Qian, Ruzhi Xu, Bin Tang, Xin P...
AOSE
2005
Springer
15 years 8 months ago
Applying Multi-agent Concepts to Dynamic Plug-In Architectures
In this work we present the basic concepts for a dynamic plug-in-based software architecture using concepts from the Petri netbased MAS framework Mulan. By transferring the concept...
Lawrence Cabac, Michael Duvigneau, Daniel Moldt, H...