Sciweavers

245 search results - page 3 / 49
» The Iterated Weakest Link
Sort
View
68
Voted
MPC
1992
Springer
135views Mathematics» more  MPC 1992»
15 years 1 months ago
A Calculus for Predicative Programming
A calculus for developing programs from specifications written as predicates that describe the relationship between the initial and final state is proposed. Such specifications are...
Emil Sekerinski
VTC
2008
IEEE
113views Communications» more  VTC 2008»
15 years 3 months ago
Coverage Performance Analysis of Multiuser MIMO Broadcast Systems
— We consider the downlink of a multiuser multi-input multi-output (MIMO) broadcast channel under a single cell structure. To study the achievable link coverage performance of ze...
Li-Chun Wang, Chu-Jung Yeh, Chi-Fang Li
92
Voted
ACSAC
2007
IEEE
15 years 3 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...
IEEEARES
2007
IEEE
15 years 3 months ago
CASSIS - Computer-based Academy for Security and Safety in Information Systems
Information technologies and society are highly interwoven nowadays, but in both, the private and business sector, users are often not aware of security issues or lack proper secu...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
15 years 2 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu