Sciweavers

107 search results - page 22 / 22
» A Reputation-Based Approach for Securing Vivaldi Embedding S...
Sort
View
TOPLAS
2008
138views more  TOPLAS 2008»
13 years 4 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
COMCOM
2006
121views more  COMCOM 2006»
13 years 4 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal