Sciweavers

1564 search results - page 52 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
IS
2007
14 years 9 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
SRDS
1999
IEEE
15 years 2 months ago
Trust and Electronic Commerce - More than a Technical Problem
In our paper we argue that the building of trust in electronic commerce depends only partly on technical security and the knowledge of security gaps and ways of closing them. It i...
Kornelia Konrad, Gerhard Fuchs, Jochen Barthel
SACRYPT
2009
Springer
162views Cryptology» more  SACRYPT 2009»
15 years 4 months ago
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
CC
2003
Springer
102views System Software» more  CC 2003»
15 years 3 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
INDOCRYPT
2003
Springer
15 years 2 months ago
Practical Mental Poker Without a TTP Based on Homomorphic Encryption
A solution for obtaining impartial random values in on-line gambling is presented in this paper. Unlike most previous proposals, our method does not require any TTP and allows e-ga...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...