Sciweavers

160 search results - page 17 / 32
» Secure Information Flow in Mobile Bootstrapping Process
Sort
View
ACSAC
2007
IEEE
15 years 6 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
EUROSSC
2006
Springer
15 years 3 months ago
Towards Hovering Information
This paper introduces a new concept of information that can exist in a mobile environment with no fixed infrastructure and centralized servers, which we call the Hovering Informati...
Alfredo A. Villalba Castro, Dimitri Konstantas
ICCS
2004
Springer
15 years 5 months ago
A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering
This paper presents a two-leveled mobile agent system for electronic commerce. It is based on mobile agents as mediators and uses the publish/subscribe paradigm for registration an...
Ozgur Koray Sahingoz, Nadia Erdogan
DRM
2005
Springer
15 years 5 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
POPL
2004
ACM
15 years 12 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette