Idea: simulation based security requirement verification for transaction level models
Abstract
References
Recommendations
Idea: writing secure c programs with secprove
ESSoS'13: Proceedings of the 5th international conference on Engineering Secure Software and SystemsThis paper describes SecProve, a prototype tool we are developing for checking application-specific security properties of C code, together with our vision of how such a tool can be used by a programmer to maintain security of code during its ...
Integrating an Idea Generation Method into a Goal-Oriented Analysis Method for Requirements Elicitation
APSEC '05: Proceedings of the 12th Asia-Pacific Software Engineering ConferenceThis paper proposes an extension of goal-oriented analysis method where an idea generation method is combined. Goal-oriented analysis methods are one of the promising approaches for requirements elicitation. However, they have two major shortcomings; 1) ...
A Survey on Hardware Implementation of IDEA Cryptosystem
The main goal of hardware implementation of a cryptosystem is to make it compatible for high speed networks. The cryptographic algorithms are very much computationally intensive and to achieve a high speed execution, hardware is necessary. In this paper,...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
In-Cooperation
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Check for updates
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0