Sciweavers

416 search results - page 3 / 84
» Some new approaches for preventing software tampering
Sort
View
IROS
2009
IEEE
159views Robotics» more  IROS 2009»
13 years 11 months ago
Hiding real-time: A new approach for the software development of industrial robots
—Software development for industrial robots is still strongly limited by the use of old-style robot programming languages. These languages are tailored to meet a special requirem...
Alwin Hoffmann, Andreas Angerer, Frank Ortmeier, M...
ATAL
2003
Springer
13 years 8 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
ASSETS
2010
ACM
12 years 11 months ago
Broadening accessibility through special interests: a new approach for software customization
Individuals diagnosed with autism spectrum disorder (ASD) often fixate on narrow, restricted interests. These interests can be highly motivating, but they can also create attentio...
Robert R. Morris, Connor R. Kirschbaum, Rosalind W...
JTAER
2010
121views more  JTAER 2010»
13 years 3 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
BIRTHDAY
2012
Springer
12 years 11 days ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...