Sciweavers

112 search results - page 23 / 23
» Generalized Certificate Revocation
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 5 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
SAC
2008
ACM
13 years 4 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...