Sciweavers

4820 search results - page 213 / 964
» Implementing Signatures for C
Sort
View
125
Voted
IJISEC
2006
106views more  IJISEC 2006»
15 years 3 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
136
Voted
SOCO
2008
Springer
15 years 3 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
AAMAS
2002
Springer
15 years 3 months ago
Larks: Dynamic Matchmaking Among Heterogeneous Software Agents in Cyberspace
Service matchmaking among heterogeneous software agents in the Internet is usually done dynamically and must be efficient. There is an obvious trade-off between the quality and eff...
Katia P. Sycara, Seth Widoff, Matthias Klusch, Jia...
121
Voted
CORR
2004
Springer
107views Education» more  CORR 2004»
15 years 3 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...
PRESENCE
1998
112views more  PRESENCE 1998»
15 years 3 months ago
The Sounds of Physical Shapes
We propose a general framework for the simulation of sounds produced by colliding physical objects in a virtual reality environment. The framework is based on the vibration dynami...
Kees van den Doel, Dinesh K. Pai