Sciweavers

14824 search results - page 68 / 2965
» Security - Introduction
Sort
View
86
Voted
FOSAD
2000
Springer
15 years 4 months ago
The Logic of Authentication Protocols
Paul F. Syverson, Iliano Cervesato
71
Voted
OOPSLA
2000
Springer
15 years 4 months ago
Middleware object query processing with deferred updates and autonomous sources
Jerry Kiernan, Michael J. Carey
73
Voted
OOPSLA
2000
Springer
15 years 4 months ago
Exclusion for composite objects
James Noble, David Holmes, John Potter
97
Voted
OOPSLA
2000
Springer
15 years 4 months ago
Safely creating correct subclasses without seeing superclass code
Clyde Ruby, Gary T. Leavens
75
Voted
OOPSLA
2000
Springer
15 years 4 months ago
Sealed calls in Java packages
Ayal Zaks, Vitaly Feldman, Nava Aizikowitz