Sciweavers

5843 search results - page 146 / 1169
» Software Security in Practice
Sort
View
SRDS
1999
IEEE
15 years 8 months ago
Trust and Electronic Commerce - More than a Technical Problem
In our paper we argue that the building of trust in electronic commerce depends only partly on technical security and the knowledge of security gaps and ways of closing them. It i...
Kornelia Konrad, Gerhard Fuchs, Jochen Barthel
SACRYPT
2009
Springer
162views Cryptology» more  SACRYPT 2009»
15 years 11 months ago
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
INDOCRYPT
2003
Springer
15 years 9 months ago
Practical Mental Poker Without a TTP Based on Homomorphic Encryption
A solution for obtaining impartial random values in on-line gambling is presented in this paper. Unlike most previous proposals, our method does not require any TTP and allows e-ga...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
RCIS
2010
15 years 2 months ago
Evaluating cross-organizational ERP requirements engineering practices: a focus group study
This focus group study presents our first validation of practices for engineering the coordination requirements in cross­ organizational Enterprise Resource Planning (ERP) project...
Maya Daneva, Niv Ahituv
AISM
2004
15 years 5 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...