cryptography research papers 2012
Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software free download ABSTRACT Software-based attacks (eg, malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key cryptography, which can mitigate Multi-instance security and its application to password-based cryptography free download This […]
software architectural model research papers
Using architectural models at runtime: Research challenges free download D Garlan, B Schmerl ,Software Architecture, 2004 ,Springer 1 Introduction One crucial aspect of high quality software engineering is the development of a well- defined software architectural model. Such a model describes the runtime manifesta- tion of a software system in terms of its high level components and their […]
software testing research papers 2012
On the testing of user-configurable software systems using firewalls free download B Robinson, L White – Software Testing, Verification and , 2012 ,Wiley Online Library Settings are defined as values that exist inside a configurable element and are visible and changeable by the user. Changes to settings can be made when the system is offline or online, depending on the […]