Sciweavers

323 search results - page 34 / 65
» Security Analysis of Mobile Java
Sort
View
CSFW
2003
IEEE
15 years 3 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann
USS
2010
14 years 7 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
BROADNETS
2006
IEEE
15 years 3 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
81
Voted
ADHOCNOW
2006
Springer
15 years 3 months ago
Threats to Security in DSRC/WAVE
Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the message...
Christine Laurendeau, Michel Barbeau
ECRA
2008
121views more  ECRA 2008»
14 years 9 months ago
Past, present and future of mobile payments research: A literature review
The mobile payment services markets are currently under transition with a history of numerous tried and failed solutions, and a future of promising but yet uncertain possibilities...
Tomi Dahlberg, Niina Mallat, Jan Ondrus, Agnieszka...