Sciweavers

410 search results - page 27 / 82
» Software Protection with Code Mobility
Sort
View
DEXAW
1998
IEEE
109views Database» more  DEXAW 1998»
15 years 2 months ago
Expressing Dynamics of Mobile Agent Systems Using Ambient Calculus
The mobile agent approach has become popular due to recent developments in the mobile code paradigm and enabling programming technologies. Many existing agentbased systems lack cl...
Peter Stañski, Arkady B. Zaslavsky
AC
1997
Springer
15 years 2 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
WISEC
2010
ACM
14 years 8 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu
OSDI
2006
ACM
15 years 10 months ago
XFI: Software Guards for System Address Spaces
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any privilege level and even for legacy code in commodit...
Úlfar Erlingsson, George C. Necula, Mart&ia...
EUROMICRO
2005
IEEE
15 years 4 months ago
Naked Objects versus Traditional Mobile Platform Development: A Comparative Case Study
It has been suggested that use of the Naked Objects pattern could contribute to business agility of applications and reduce the amount of the application code up to 75 percent in ...
Heikki Keränen, Pekka Abrahamsson