Sciweavers

12637 search results - page 88 / 2528
» Security for Extensible Systems
Sort
View
124
Voted
SAFECOMP
1998
Springer
15 years 7 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha
JALC
2006
61views more  JALC 2006»
15 years 3 months ago
Random Polynomial-Time Attacks and Dolev-Yao Models
In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao ...
Mathieu Baudet
86
Voted
SOUPS
2009
ACM
15 years 10 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
93
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System
Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Rob...
82
Voted
SP
2008
IEEE
15 years 10 months ago
Thinking Inside the Box: System-Level Failures of Tamper Proofing
Saar Drimer, Steven J. Murdoch, Ross J. Anderson