Sciweavers

35 search results - page 1 / 7
» jcs 2006
Sort
View
81
Voted
JCS
2002
63views more  JCS 2002»
15 years 23 days ago
Eliminating Counterevidence with Applications to Accountable Certificate Management
Ahto Buldas, Peeter Laud, Helger Lipmaa
72
Voted
JCS
1998
85views more  JCS 1998»
15 years 23 days ago
The Inductive Approach to Verifying Cryptographic Protocols
Lawrence C. Paulson
JCS
2010
104views more  JCS 2010»
14 years 11 months ago
Static analysis for detecting taint-style vulnerabilities in web applications
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
76
Voted
JCS
2010
82views more  JCS 2010»
14 years 11 months ago
Independence from obfuscation: A semantic framework for diversity
Riccardo Pucella, Fred B. Schneider