One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
iam Pugh. Advice to authors of extended abstracts. http://www.acm.org/sigplan/conferences/author-info/pughadvice.html. [7] Mary Shaw. Writing good software engineering research pap...
Ralph E. Johnson, Kent Beck, Grady Booch, William ...
When IEEE 802.11i draft[1] proposed TKIP, it is expected to improve WEP on both active and passive attack methods. TKIP uses more sophisticated methods to distribute and manage se...
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...