Sciweavers

6 search results - page 2 / 2
» Integrity (I) Codes: Message Integrity Protection and Authen...
Sort
View
ACSAC
2004
IEEE
13 years 9 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong