Sciweavers

949 search results - page 108 / 190
» Design methods for security and trust
Sort
View
141
Voted
MMSEC
2006
ACM
115views Multimedia» more  MMSEC 2006»
15 years 10 months ago
An improvement to a biometric.based multimedia content protection scheme
A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve con...
Daniel Socek, Michal Sramka, Oge Marques, Dubravko...
OOPSLA
1998
Springer
15 years 8 months ago
Data Groups: Specifying the Modification of Extended State
This paper explores the interpretation of specifications in the context of an object-oriented programming language with subclassing and method overrides. In particular, the paper ...
K. Rustan M. Leino
142
Voted
EUROCRYPT
2004
Springer
15 years 10 months ago
Construction of Secure Random Curves of Genus 2 over Prime Fields
For counting points of Jacobians of genus 2 curves defined over large prime fields, the best known method is a variant of Schoof’s algorithm. We present several improvements on...
Pierrick Gaudry, Éric Schost
149
Voted
PLDI
2006
ACM
15 years 10 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
ASM
2010
ASM
16 years 1 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds