Sciweavers

1843 search results - page 59 / 369
» Securing Class Initialization
Sort
View
120
Voted
IJAHUC
2010
130views more  IJAHUC 2010»
15 years 28 days ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
15 years 8 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
ASWEC
2008
IEEE
15 years 9 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
15 years 6 months ago
On Related-Secret Pseudorandomness
Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among ke...
David Goldenberg, Moses Liskov
CC
2003
Springer
201views System Software» more  CC 2003»
15 years 6 months ago
Effective Inline-Threaded Interpretation of Java Bytecode Using Preparation Sequences
Abstract. Inline-threaded interpretation is a recent technique that improves performance by eliminating dispatch overhead within basic blocks for interpreters written in C [11]. Th...
Etienne Gagnon, Laurie J. Hendren