Sciweavers

551 search results - page 10 / 111
» Preventing existence
Sort
View
ISW
2010
Springer
14 years 9 months ago
An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications
Abstract. Instruction Set Randomization (ISR) is a promising technique for preventing code-injection attacks. In this paper we present a complete randomization framework for JavaSc...
Elias Athanasopoulos, Antonis Krithinakis, Evangel...
ICITA
2005
IEEE
15 years 5 months ago
Some Remarks on Security of Receipt-Free E-auction
Recently, a receipt-free scheme is rising for a secure eauction. The goal of a receipt-free scheme in an eauction is to prevent a bid-rigging. If the bid-rigging happens in the e-...
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
92
Voted
SRDS
2000
IEEE
15 years 4 months ago
Modeling Fault-Tolerant Mobile Agent Execution as a Sequence of Agreement Problems
Fault-tolerance is fundamental to the further development of mobile agent applications. In the context of mobile agents, fault-tolerance prevents a partial or complete loss of the...
Stefan Pleisch, André Schiper
77
Voted
WADT
1998
Springer
15 years 4 months ago
Semantic Constructions for Hidden Algebra
Abstract. Hidden algebra is a behavioural algebraic specification formalism for objects. It captures their constructional aspect, concerned with the initialisation and evolution of...
Corina Cîrstea
CSUR
2004
132views more  CSUR 2004»
14 years 11 months ago
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
Over the past years, mobile agent technology has attracted considerable attention, and a significant body of literature has been published. To further develop mobile agent technol...
Stefan Pleisch, André Schiper