Sciweavers

5722 search results - page 169 / 1145
» Security Function Interactions
Sort
View
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 7 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
96
Voted
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
15 years 4 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
CHI
2007
ACM
16 years 1 months ago
The impact of digital iconic realism on anonymous interactants' mobile phone communication
In this paper, I describe progress in research designed to explore the effect of the combination of behavioral and visual fidelity of avatars on users' social presence in syn...
Sin-Hwa Kang
ISI
2004
Springer
15 years 6 months ago
Interactive Query Languages for Intelligence Tasks
Counterterrorism and intelligence tasks rely on the efficient collection, analysis and dissemination of information. While information systems play a key role in such tasks, databa...
Antonio Badia
96
Voted
EUROCRYPT
2007
Springer
15 years 4 months ago
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is concerned with designing efficient symmetric encryption and authentication schemes...
Ueli M. Maurer, Johan Sjödin