Sciweavers

2290 search results - page 97 / 458
» Extensible Protected Types
Sort
View
CCS
2007
ACM
15 years 8 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
113
Voted
ICFP
1999
ACM
15 years 6 months ago
A Simple Proof Technique for Certain Parametricity Results
Many properties of parametric, polymorphic functions can be determined simply by inspection of their types. Such results are usually proven using Reynolds's parametricity the...
Karl Crary
114
Voted
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 4 months ago
Instruction Set Limitation in Support of Software Diversity
This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a...
Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat,...
HASKELL
2006
ACM
15 years 8 months ago
Polymorphic variants in Haskell
In languages that support polymorphic variants, a single variant value can be passed to many contexts that accept different sets of constructors. Polymorphic variants are potenti...
Koji Kagawa
ESSOS
2010
Springer
15 years 11 months ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...