Sciweavers

14824 search results - page 89 / 2965
» Security - Introduction
Sort
View
84
Voted
ACSAC
1999
IEEE
15 years 5 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
79
Voted
FOSAD
2007
Springer
15 years 6 months ago
Security Protocols: Principles and Calculi
Martín Abadi
68
Voted
FOSAD
2007
Springer
15 years 6 months ago
Low-Level Software Security: Attacks and Defenses
Úlfar Erlingsson
95
Voted
ISPEC
2005
Springer
15 years 6 months ago
Secure Software Delivery and Installation in Embedded Systems
ded abstract of this technical report appeared in the Proceedings of the First Information Security Practice and Experience Conference (ISPEC 2005) [AHS05].
André Adelsbach, Ulrich Huber, Ahmad-Reza S...
67
Voted
OOPSLA
2005
Springer
15 years 6 months ago
Security patterns and evolution of MTA architecture
Munawar Hafiz