Sciweavers

5843 search results - page 197 / 1169
» Software Security in Practice
Sort
View
ISBI
2004
IEEE
16 years 5 months ago
Software Process: The Key to Developing Robust, Reusable and Maintainable Open-Source Software
The practice of image processing inherently requires software development. Creating this technology requires designing, implementing, debugging and testing software applications o...
Ken Martin, Luis Ibáñez, William J. ...
155
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
IJSN
2006
124views more  IJSN 2006»
15 years 4 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
ITP
2008
117views Mathematics» more  ITP 2008»
15 years 4 months ago
Mobilization of software developers: the free software movement
Free/open source software (F/OSS) development projects are growing at a rapid rate. Globally dispersed virtual communities with large groups of software developers contribute time...
Margaret S. Elliott, Walt Scacchi
124
Voted
SIGCPR
1999
ACM
105views Hardware» more  SIGCPR 1999»
15 years 9 months ago
A university-based approach to the diffusion of knowledge management concepts and practice
This paper addresses the diffusion of Knowledge Management concepts, principles, and cases into university courses. Although we are now living in a world of gigabit transmission s...
Stephen Ruth, Jeffrey Theobald, Virgil Frizzell