Sciweavers

1843 search results - page 97 / 369
» Securing Class Initialization
Sort
View
172
Voted
ESORICS
2002
Springer
16 years 4 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
HOST
2008
IEEE
15 years 11 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
ACISP
2005
Springer
15 years 10 months ago
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
Abstract. Multivariate public-key cryptosystems (sometimes polynomial-based PKC’s or just multivariates) handle polynomials of many variables over relatively small fields instea...
Bo-Yin Yang, Jiun-Ming Chen
140
Voted
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
15 years 8 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
AAAI
2010
15 years 6 months ago
Security Games with Arbitrary Schedules: A Branch and Price Approach
Security games, and important class of Stackelberg games, are used in deployed decision-support tools in use by LAX police and the Federal Air Marshals Service. The algorithms use...
Manish Jain, Erim Kardes, Christopher Kiekintveld,...