Sciweavers

5843 search results - page 153 / 1169
» Software Security in Practice
Sort
View
AGILEDC
2004
IEEE
15 years 8 months ago
The XP Customer Role in Practice: Three Studies
The Customer is the only non-developer role in eXtreme Programming (XP). The Customer's explicit responsibilities are to drive the project, providing project requirements (us...
Angela Martin, Robert Biddle, James Noble
ACSW
2004
15 years 5 months ago
Towards a multi-lingual workflow system a practical outlook
Due to rapid development in the global market, workflow systems are not limited to a single country. Electronic business like workflows span across countries and hence there arise...
Bastin Tony Roy Savarimuthu, Maryam Purvis
ECSCW
2011
14 years 4 months ago
The Hugging Team: The Role of Technology in Business Networking Practices
Technological devices for social networking are produced in droves and networking through media seems to be the way of getting ahead in business. We examine what role technology pl...
Anne Thorsø Sørensen, Irina Shklovsk...
CCS
2004
ACM
15 years 10 months ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner
IACR
2011
158views more  IACR 2011»
14 years 4 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...