Sciweavers

252 search results - page 36 / 51
» Protecting Software Code by Guards
Sort
View
CCS
2004
ACM
15 years 5 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
CCS
2008
ACM
15 years 1 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
CODES
2008
IEEE
15 years 6 months ago
A security monitoring service for NoCs
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-onChip (...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano
ICSM
1999
IEEE
15 years 4 months ago
Criteria for Testing Exception-Handling Constructs in Java Programs
Exception-handling constructs provide a mechanism for raising exceptions, and a facility for designating protected code by attaching exception handlers to blocks of code. Despite ...
Saurabh Sinha, Mary Jean Harrold
DRMTICS
2005
Springer
15 years 5 months ago
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law - the so called anti-circumvention provisions....
Brian Fitzgerald