Sciweavers

410 search results - page 19 / 82
» Software Protection with Code Mobility
Sort
View
PUC
2000
94views more  PUC 2000»
14 years 10 months ago
Places to Stay on the Move: Software Architectures for Mobile User Interfaces
abstract Alan Dix Devina Ramduny Tom Rodden, Nigel Davies. aQtive limited and Staffordshire University Staffordshire University Lancaster University http://www.hiraeth.com/alan/top...
Alan J. Dix, Devina Ramduny, Tom Rodden, Nigel Dav...
TRUST
2010
Springer
15 years 3 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
78
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 4 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
ICSE
1997
IEEE-ACM
15 years 2 months ago
Designing Distributed Applications with Mobile Code Paradigms
Large scale distributed systems are becoming of paramount importance, due to the evolution of technology and to the interest of market. Their development, however, is not yet supp...
Antonio Carzaniga, Gian Pietro Picco, Giovanni Vig...
CL
2008
Springer
14 years 10 months ago
Automatic synthesis and verification of real-time embedded software for mobile and ubiquitous systems
Currently available application frameworks that target the automatic design of real-time embedded software are poor in integrating functional and non-functional requirements for m...
Pao-Ann Hsiung, Shang-Wei Lin