Sciweavers

2213 search results - page 161 / 443
» Software Security
Sort
View
140
Voted
SOSP
2009
ACM
16 years 14 days ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
DAGSTUHL
2007
15 years 5 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
109
Voted
EUC
2005
Springer
15 years 9 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...
ETFA
2008
IEEE
15 years 10 months ago
A secure agent platform for active RFID
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...
Albert Treytl, Werner Spenger, Bilal Riaz
98
Voted
ITRE
2005
IEEE
15 years 9 months ago
Integrated use of Web technologies to deliver a secure collaborative Web portal
This paper describes the design and operation of the OMII web site, which has to date achieved three major targets. The first target is the successful integrations in different te...
Victor Chang