Sciweavers

35 search results - page 1 / 7
» jcs 2006
Sort
View
96
Voted
JCS
2002
63views more  JCS 2002»
15 years 3 months ago
Eliminating Counterevidence with Applications to Accountable Certificate Management
Ahto Buldas, Peeter Laud, Helger Lipmaa
87
Voted
JCS
1998
85views more  JCS 1998»
15 years 3 months ago
The Inductive Approach to Verifying Cryptographic Protocols
Lawrence C. Paulson
JCS
2010
104views more  JCS 2010»
15 years 1 months ago
Static analysis for detecting taint-style vulnerabilities in web applications
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
94
Voted
JCS
2010
82views more  JCS 2010»
15 years 1 months ago
Independence from obfuscation: A semantic framework for diversity
Riccardo Pucella, Fred B. Schneider