Although more complicated, the Leighton-Micali protocol is more elegant, efficient, and secure than the venerable Kerberos security protocol.
The Secure Electronic Transaction (SET) is an open encryption and security specification designed to protect credit-card transactions on the Internet.
Security protocols can be performance assassins. Linden examines several multimedia security protocols, and explains why they can devastate performance.
The security-design techniques Uttara presents here provide a way of modeling security by extending the functional model of the system, instead of divorcing one from the other.
Central to Windows 2000 security are Security Descriptors -- structures and associated data that contain the security information for securable objects.
David presents a technique that lets multiple language resources be built into a single resource DLL and automatically referenced by Windows applications.
There's no telling what intruders might leave behind when they break into your system overnight. Wietse describes how he analyzed an unknown program left behind by one intruder.
Robot control programs take a robot's sensory input, process it, and decide which motor actions the robot will perform. Our authors use the Colbert sequencer language to develop control code.
Error handling is an important issue in embedded systems, and can account for a substantial portion of a project's code. Our authors describe how they designed and implemented an exception-handling library.
The web-based Distributed Authoring and Versioning (WebDAV) specification defines a set of extensions to the HTTP protocol that let you collaboratively edit and manage files on remote web servers.
OpenCV is an open-source, computer-vision library for extracting and processing meaningful data from images.
To hear Michael talk about it, you'd think interactive toys and open source are kid's stuff.
Al gets back on track in updating his Quincy IDE that hosts the GNU C/C++ compiler suite of tools on the Win32 platform.
How can you establish a network connection using Java? Mike shows how.
Generic tree traversal logic can be used with any type of tree-like structure or tree node, letting you focus on the application logic rather than the internals of the tree structure organization.
Making money is the challenge Ecco and Liane are faced with this month.
This month Greg looks at Programming Pearls, Second Edition, by Jon Bentley; Foundations of Multithreaded, Parallel, and Distributing Programming, by Gregory R. Andrews; GUI Bloopers, by Jeff Johnson; The Humane Interface, by Jef Raskin; Legal Battles That Shaped the Software Industry, by Lawrence D. Graham; The World of Scripting Languages, by David Barron; C for Java Programmers, by Tomasz Muldner; and XML Elements of Style, by Simon St. Laurent.