Sciweavers

637 search results - page 87 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
IJNSEC
2008
160views more  IJNSEC 2008»
15 years 1 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler
CG
2007
Springer
15 years 1 months ago
Semantic lenses: Seamless augmentation of web pages with context information from implicit queries
We propose a novel method to support analytical processes by visually integrating context information directly into web pages. The context information is obtained from knowledge b...
Martin Rotard, Mark Giereth, Thomas Ertl
SIAMCOMP
2008
100views more  SIAMCOMP 2008»
15 years 1 months ago
On the Complexity of Verifying Consistency of XML Specifications
XML specifications often consist of a type definition (typically, a DTD) and a set of integrity constraints. It has been shown previously that such specifications can be inconsiste...
Marcelo Arenas, Wenfei Fan, Leonid Libkin
ASPLOS
2006
ACM
15 years 8 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 5 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou