Sciweavers

694 search results - page 71 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
BMCBI
2005
91views more  BMCBI 2005»
14 years 11 months ago
Providing visualisation support for the analysis of anatomy ontology data
Background: Improvements in technology have been accompanied by the generation of large amounts of complex data. This same technology must be harnessed effectively if the knowledg...
Aba-Sah Dadzie, Albert Burger
WOSP
2005
ACM
15 years 5 months ago
Performance by unified model analysis (PUMA)
Evaluation of non-functional properties of a design (such as performance, dependability, security, etc.) can be enabled by design annotations specific to the property to be evalua...
C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan...
ICIAR
2010
Springer
15 years 4 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
MIDDLEWARE
2007
Springer
15 years 6 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
WISEC
2009
ACM
15 years 6 months ago
Towards a theory for securing time synchronization in wireless sensor networks
Time synchronization in highly distributed wireless systems like sensor and ad hoc networks is extremely important in order to maintain a consistent notion of time throughout the ...
Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, ...