Sciweavers

3003 search results - page 189 / 601
» Software Security: Building Security In
Sort
View
147
Voted
PVLDB
2010
172views more  PVLDB 2010»
15 years 3 months ago
Secure Personal Data Servers: a Vision Paper
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. Citizen themselves often count on in...
Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yan...
GLOBECOM
2010
IEEE
15 years 2 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
PKC
2005
Springer
110views Cryptology» more  PKC 2005»
15 years 10 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...
OOPSLA
2007
Springer
15 years 10 months ago
From developer's head to developer tests: characterization, theories, and preventing one more bug
Unit testing frameworks like JUnit are a popular and effective way to prevent developer bugs. We are investigating two ways of building on these frameworks to prevent more bugs wi...
David Saff
WISE
2003
Springer
15 years 10 months ago
Service-Oriented Computing: Concepts, Characteristics and Directions
Service-Oriented Computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applications/solutions. To build the service model, SOC re...
Mike P. Papazoglou