Sciweavers

6555 search results - page 1064 / 1311
» Secure attribute-based systems
Sort
View
133
Voted
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 9 months ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...
125
Voted
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
15 years 9 months ago
Trusted Software's Holy Grail
In this paper, we discuss what we believe is the grand challenge facing the software quality research community: the ability to accurately define, in the very earliest stages of d...
Jeffrey M. Voas
ICSM
2003
IEEE
15 years 9 months ago
Critical Success Factors in Software Maintenance-A Case Study
: The objective of this paper is to identify those factors, which are critical to the success of a maintenance operation in general and to apply them to a particular maintenance pr...
Harry M. Sneed, Peter Brössler
IPPS
2003
IEEE
15 years 9 months ago
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array
This paper describes a hardware architecture for modular multiplication operation which is efficient for bit-lengths suitable for both commonly used types of Public Key Cryptogra...
Siddika Berna Örs, Lejla Batina, Bart Preneel...
113
Voted
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
15 years 9 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu
« Prev « First page 1064 / 1311 Last » Next »