Sciweavers

3003 search results - page 177 / 601
» Software Security: Building Security In
Sort
View
IOLTS
2006
IEEE
68views Hardware» more  IOLTS 2006»
15 years 10 months ago
Power Attacks on Secure Hardware Based on Early Propagation of Data
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
15 years 6 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
JSW
2007
97views more  JSW 2007»
15 years 4 months ago
Using Aspect Programming to Secure Web Applications
—As the Internet users increase, the need to protect  web servers from malicious users has become a priority in  many   organizations   and   companies.   ...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...
HICSS
2008
IEEE
167views Biometrics» more  HICSS 2008»
15 years 11 months ago
An Operational Framework for Service Oriented Architecture Network Security
: This study proposes a new operational framework for Service Oriented Architecture (SOA) network security. It seeks to characterize the current state of practices in SOA network s...
Robert Bunge, Sam Chung, Barbara Endicott-Popovsky...
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 10 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya