Sciweavers

1843 search results - page 65 / 369
» Securing Class Initialization
Sort
View
SP
1999
IEEE
126views Security Privacy» more  SP 1999»
15 years 6 months ago
Flexible Policy-Directed Code Safety
This work introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform...
David Evans, Andrew Twyman
OOPSLA
1990
Springer
15 years 6 months ago
Mixin-based Inheritance
The diverse inheritance mechanisms provided by Smalltalk, Beta, and CLOS are interpreted as different uses of a single underlying construct. Smalltalk and Beta differ primarily in...
Gilad Bracha, William R. Cook
CRYPTO
1991
Springer
105views Cryptology» more  CRYPTO 1991»
15 years 6 months ago
Universal Hashing and Authentication Codes
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
IANDC
2008
84views more  IANDC 2008»
15 years 1 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
111
Voted
MOC
2010
14 years 9 months ago
hp-Optimal discontinuous Galerkin methods for linear elliptic problems
Abstract. The aim of this paper is to present and analyze a class of hpversion discontinuous Galerkin (DG) discretizations for the numerical approximation of linear elliptic proble...
Benjamin Stamm, Thomas P. Wihler