Sciweavers

2213 search results - page 255 / 443
» Software Security
Sort
View
ESORICS
2010
Springer
15 years 4 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
ISI
2007
Springer
15 years 3 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
OOPSLA
2010
Springer
15 years 2 months ago
Component adaptation and assembly using interface relations
Software’s expense owes partly to frequent reimplementation of similar functionality and partly to maintenance of patches, ports or components targeting evolving interfaces. Mor...
Stephen Kell
OOPSLA
2010
Springer
15 years 2 months ago
Refactoring references for library migration
This report is a companion to the paper “Refactoring References for Library Migration” published at the ACM SIGPLAN International Conference on Systems, Programming, Languages...
Puneet Kapur, Bradley Cossette, Robert J. Walker
SICHERHEIT
2010
15 years 1 months ago
Towards Optimal Sensor Placement Strategies for Early Warning Systems
: A network early warning system consists of several distributed sensors to detect malicious network activity. The effectiveness of such early warning systems critically depends on...
Jan Göbel, Philipp Trinius