Sciweavers

2429 search results - page 206 / 486
» Using Aspects to Design a Secure System
Sort
View
141
Voted
WWW
2005
ACM
16 years 4 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
139
Voted
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
15 years 9 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
125
Voted
WETICE
1998
IEEE
15 years 7 months ago
Using a Groupware Space for Distributed Requirements Engineering
Requirements engineering (RE) is a necessary part of the software development process, as it helps customers and designers identify necessary system requirements. If these stakeho...
Daniela E. Herlea, Saul Greenberg
CCS
2008
ACM
15 years 5 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
150
Voted
WISEC
2009
ACM
15 years 10 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...