Sciweavers

5843 search results - page 204 / 1169
» Software Security in Practice
Sort
View
ASIACRYPT
2007
Springer
15 years 11 months ago
Fully Anonymous Group Signatures Without Random Oracles
We construct a new group signature scheme using bilinear groups. The group signature scheme is practical, both keys and group signatures consist of a constant number of group elem...
Jens Groth
157
Voted
FOSAD
2008
Springer
15 years 6 months ago
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment
This paper discusses how electronic voting was implemented in practice in the Netherlands, which choices were made and how electronic voting was finally abolished. This history is ...
Bart Jacobs, Wolter Pieters
110
Voted
EVOTING
2004
113views Hardware» more  EVOTING 2004»
15 years 6 months ago
E-Voting and Biometric Systems
: As e-Voting gains more importance while practicable solutions are being implemented, more questions arise concerning alternative possibilities for a secure and feasible authentic...
Sonja Hof
121
Voted
JOT
2006
76views more  JOT 2006»
15 years 4 months ago
Programming with Models? Modeling with Code. The Role of Models in Software Development
on, a model is an abstraction of the real thing. In practice, engineers work with partial descriptions (models) and add/remove model at each level of abstraction. Models describe a...
Dave Thomas
128
Voted
ICSQP
1994
15 years 6 months ago
Using Strongest Postconditions to Improve Software Quality
: The cost of developing and maintaining high quality software remains at a premium. In this paper we introduce a practical approach for enhancement of software quality, based on c...
Si Pan, R. Geoff Dromey