Amanote Research

Amanote Research

    RegisterSign In

Secure Design Patterns

doi 10.21236/ada501670
Full Text
Open PDF
Abstract

Available in full text

Date

March 1, 2009

Authors
Chad DoughertyKirk SayreRobert C. SeacordDavid SvobodaKazuya Togashi
Publisher

Defense Technical Information Center


Related search

On Secure Embedded Token Design

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Secure File Multi Transfer Protocol Design

Journal of Software Engineering and Applications
2011English

Design of a Secure E-Business Application /

2010English

Formalising Design Patterns

1996English

Design of a Secure Front End System.

English

Design and Implementation of Secure Stream Cipher Algorithm

International Journal of Computing and Digital Systems
Computer GraphicsHuman-Computer InteractionComputer NetworksCommunicationsInformation SystemsComputer-Aided DesignInnovationManagement of TechnologyArtificial Intelligence
2018English

A Secure Architecture of Design for Testability Structures

International Journal of Recent Technology and Engineering
EngineeringManagement of TechnologyInnovation
2019English

Design and Implementation of Secure Distributed Examination System

2017English

User Interface Design Patterns

2010English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy