System evaluation lifecycle: chasing windmills
Abstract
References
Index Terms
- System evaluation lifecycle: chasing windmills
Recommendations
A secure and efficient certificateless signature scheme for Internet of Things
AbstractThe Internet of Things (IoT) is a new technological innovation, which makes things intelligent and our life more convenient. To ensure secure communication between smart objects in the IoT, certificateless signature is a feasible ...
TBVPAKE: An efficient and provably secure verifier-based PAKE protocol for IoT applications
AbstractPassword-authenticated key exchange (PAKE) is an important cryptographic primitive by which two parties are allowed to authenticate each other and establish a cryptographically strong key using a low-entropy password over an insecure ...
Evaluation of Security Lifecycle for the Quantitative Analysis
ICHIT '08: Proceedings of the 2008 International Conference on Convergence and Hybrid Information TechnologyThis paper is intended to evaluate security lifecycle and efficiency in ISO/IEC 15408, Common Criteria. There are many risk items that cause the security requirement problems during software development. This paper evaluates the efficiency of security ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- Conference Chair:
- Michael E. Whitman,
- Program Chair:
- Humayun Zafar
Sponsors
- KSU - CISE: KSU Center for InfoSec Education
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- KSU - CISE
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 118Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in