Sciweavers

2 search results - page 1 / 1
» How to authenticate graphs without leaking
Sort
View
EDBT
2010
ACM
138views Database» more  EDBT 2010»
13 years 9 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
ECOOP
2003
Springer
13 years 10 months ago
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
Despite Java’s automatic reclamation of memory, memory leaks remain an important problem. For example, we frequently encounter memory leaks that cause production servers to crash...
Nick Mitchell, Gary Sevitsky