Sciweavers

1843 search results - page 127 / 369
» Securing Class Initialization
Sort
View
ICSE
2009
IEEE-ACM
15 years 11 months ago
Semantics-based code search
Our goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user’s specifications. The key words here are spec...
Steven P. Reiss
CRITIS
2006
15 years 8 months ago
Trust Establishment in Ad Hoc and Sensor Networks
Ad hoc and sensor networks highly depend on the distributed cooperation among network nodes. Trust establishment frameworks provide the means for representing, evaluating, maintain...
Efthimia Aivaloglou, Stefanos Gritzalis, Charalabo...
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
15 years 8 months ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller
EUROCRYPT
2010
Springer
15 years 5 months ago
On the Impossibility of Three-Move Blind Signature Schemes
We investigate the possibility to prove security of the well-known blind signature schemes by Chaum, and by Pointcheval and Stern in the standard model, i.e., without random oracle...
Marc Fischlin, Dominique Schröder
TRUSTBUS
2010
Springer
15 years 2 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...