Sciweavers

630 search results - page 42 / 126
» The Future Is Not Assured - But It Should Be
Sort
View
JAR
2000
145views more  JAR 2000»
15 years 1 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
IWPC
2010
IEEE
15 years 11 days ago
Studying the Impact of Social Structures on Software Quality
Abstract—Correcting software defects accounts for a significant amount of resources such as time, money and personnel. To be able to focus testing efforts where needed the most,...
Nicolas Bettenburg, Ahmed E. Hassan
DGO
2011
237views Education» more  DGO 2011»
14 years 1 months ago
Modeling digital preservation capabilities in enterprise architecture
The rising awareness of the challenges of preserving information over the long term has led to a wealth of initiatives developing economic models, methods, tools, systems, guideli...
Christoph Becker, Gonçalo Antunes, Jos&eacu...
MOBICOM
2012
ACM
13 years 4 months ago
Distinguishing users with capacitive touch communication
As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In t...
Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Ric...
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
15 years 8 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh