Sciweavers

35 search results - page 1 / 7
» jcs 2006
Sort
View
88
Voted
JCS
2002
63views more  JCS 2002»
15 years 1 months ago
Eliminating Counterevidence with Applications to Accountable Certificate Management
Ahto Buldas, Peeter Laud, Helger Lipmaa
80
Voted
JCS
1998
85views more  JCS 1998»
15 years 1 months ago
The Inductive Approach to Verifying Cryptographic Protocols
Lawrence C. Paulson
97
Voted
JCS
2010
104views more  JCS 2010»
15 years 19 days ago
Static analysis for detecting taint-style vulnerabilities in web applications
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
83
Voted
JCS
2010
82views more  JCS 2010»
15 years 19 days ago
Independence from obfuscation: A semantic framework for diversity
Riccardo Pucella, Fred B. Schneider