Sciweavers

35 search results - page 1 / 7
» jcs 2006
Sort
View
72
Voted
JCS
1998
85views more  JCS 1998»
15 years 22 days ago
The Inductive Approach to Verifying Cryptographic Protocols
Lawrence C. Paulson
JCS
2010
104views more  JCS 2010»
14 years 11 months ago
Static analysis for detecting taint-style vulnerabilities in web applications
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
75
Voted
JCS
2010
82views more  JCS 2010»
14 years 11 months ago
Independence from obfuscation: A semantic framework for diversity
Riccardo Pucella, Fred B. Schneider