Sciweavers

323 search results - page 16 / 65
» Security Analysis of Mobile Java
Sort
View
ECOOP
2001
Springer
15 years 2 months ago
Distinctness and Sharing Domains for Static Analysis of Java Programs
Abstract. The application field of static analysis techniques for objectoriented programming is getting broader, ranging from compiler optimizations to security issues. This leads...
Isabelle Pollet, Baudouin Le Charlier, Agostino Co...
ISICT
2003
14 years 11 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
ACMICEC
2008
ACM
253views ECommerce» more  ACMICEC 2008»
14 years 11 months ago
Secure and efficient protocol for mobile payments
Electronic Payments have gained tremendous popularity in the modern world. Credit/debit cards and online payments are in widespread use. Bringing electronic payments to the mobile...
Rahul M. Godbole, Alwyn R. Pais
73
Voted
JNCA
2011
97views more  JNCA 2011»
14 years 4 months ago
Security analysis of wireless mesh backhauls for mobile networks
Frank A. Zdarsky, Sebastian Robitzsch, Albert Banc...
APSEC
2008
IEEE
15 years 4 months ago
A Heap Model for Java Bytecode to Support Separation Logic
Memory usage analysis is an important problem for resource-constrained mobile devices, especially under mission- or safety-critical circumstances. Program codes running on or bein...
Chenguang Luo, Guanhua He, Shengchao Qin