Sciweavers

199 search results - page 6 / 40
» A system for a new two-dimensional code: Secure 2D code
Sort
View
ACSC
2006
IEEE
14 years 1 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
NDSS
2003
IEEE
14 years 20 days ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
ECWEB
2000
Springer
110views ECommerce» more  ECWEB 2000»
13 years 11 months ago
Secure PC-Franking for Everyone
PC franking systems allow customers to download postage value into their PCs and to print postage value onto envelopes or mailing labels by using regular desktop printers connected...
Gerrit Bleumer
OOPSLA
2001
Springer
13 years 12 months ago
Jiazzi: New-Age Components for Old-Fashioned Java
We present Jiazzi, a system that enables the construction of largescale binary components in Java. Jiazzi components can be thought of as generalizations of Java packages with add...
Sean McDirmid, Matthew Flatt, Wilson C. Hsieh
CODES
2007
IEEE
14 years 1 months ago
Dynamic security domain scaling on symmetric multiprocessors for future high-end embedded systems
We propose a method for dynamic security domain scaling on SMPs that offers both highly scalable performance and high security for future high-end embedded systems. Its most impor...
Hiroaki Inoue, Akihisa Ikeno, Tsuyoshi Abe, Junji ...