Sciweavers

551 search results - page 10 / 111
» Preventing existence
Sort
View
ISW
2010
Springer
14 years 7 months ago
An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications
Abstract. Instruction Set Randomization (ISR) is a promising technique for preventing code-injection attacks. In this paper we present a complete randomization framework for JavaSc...
Elias Athanasopoulos, Antonis Krithinakis, Evangel...
ICITA
2005
IEEE
15 years 3 months ago
Some Remarks on Security of Receipt-Free E-auction
Recently, a receipt-free scheme is rising for a secure eauction. The goal of a receipt-free scheme in an eauction is to prevent a bid-rigging. If the bid-rigging happens in the e-...
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
SRDS
2000
IEEE
15 years 1 months ago
Modeling Fault-Tolerant Mobile Agent Execution as a Sequence of Agreement Problems
Fault-tolerance is fundamental to the further development of mobile agent applications. In the context of mobile agents, fault-tolerance prevents a partial or complete loss of the...
Stefan Pleisch, André Schiper
WADT
1998
Springer
15 years 1 months ago
Semantic Constructions for Hidden Algebra
Abstract. Hidden algebra is a behavioural algebraic specification formalism for objects. It captures their constructional aspect, concerned with the initialisation and evolution of...
Corina Cîrstea
CSUR
2004
132views more  CSUR 2004»
14 years 9 months ago
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
Over the past years, mobile agent technology has attracted considerable attention, and a significant body of literature has been published. To further develop mobile agent technol...
Stefan Pleisch, André Schiper