Sciweavers

5843 search results - page 179 / 1169
» Software Security in Practice
Sort
View
VTC
2010
IEEE
167views Communications» more  VTC 2010»
15 years 2 months ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland
ICSE
2000
IEEE-ACM
15 years 8 months ago
Software architecture: a roadmap
Over the past decade software architecture has received increasing attention as an important subfield of software engineering. During that time there has been considerable progres...
David Garlan
TRUST
2010
Springer
15 years 9 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
117
Voted
SE
2008
15 years 6 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz
ESORICS
2004
Springer
15 years 10 months ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink