Sciweavers

14824 search results - page 101 / 2965
» Security - Introduction
Sort
View
96
Voted
ACISP
2010
Springer
15 years 4 months ago
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu
119
Voted
CSREASAM
2006
15 years 3 months ago
Security Immunization Using Basic Countermeasures
Patricia A. H. Williams
116
Voted
SIS
2004
15 years 3 months ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...
CCS
2008
ACM
15 years 3 months ago
Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries
David Dagon, Manos Antonakakis, Paul Vixie, Tatuya...
CCS
2010
ACM
15 years 2 months ago
Attacking and fixing PKCS#11 security tokens
Matteo Bortolozzo, Matteo Centenaro, Riccardo Foca...