Sciweavers

890 search results - page 52 / 178
» Programming language methods in computer security
Sort
View
117
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 7 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
100
Voted
IJNSEC
2006
94views more  IJNSEC 2006»
15 years 13 days ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
98
Voted
OOPSLA
2004
Springer
15 years 5 months ago
Example centric programming
Programmers tend to understand programs by thinking of concrete examples. Example Centric Programming seeks to add IDE support for examples throughout the process of programming. ...
Jonathan Edwards
OOPSLA
2004
Springer
15 years 5 months ago
Super and inner: together at last!
In an object-oriented language, a derived class may declare a method with the same signature as a method in the base class. The meaning of the re-declaration depends on the langua...
David S. Goldberg, Robert Bruce Findler, Matthew F...
INFOCOM
2012
IEEE
13 years 2 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...