Sciweavers

6164 search results - page 45 / 1233
» Teaching Computer Security
Sort
View
IFIP
1997
Springer
15 years 6 months ago
Representing a body of knowledge for teaching, learning and assessment
: National and international standards for professional groups may become a dominant and governing force as internet-based professional training becomes universally accepted. Educa...
Don Sheridan, David White
PDCAT
2005
Springer
15 years 8 months ago
Design of a Security Management Middleware in Ubiquitous Computing Environments
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
110
Voted
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 9 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
109
Voted
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
15 years 8 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...
145
Voted
SIGCSE
2012
ACM
284views Education» more  SIGCSE 2012»
13 years 10 months ago
Teaching operating systems using android
The computing landscape is shifting towards mobile devices. To learn about operating systems, it is increasingly important for students to gain hands-on kernel programming experie...
Jeremy Andrus, Jason Nieh