Sciweavers

6574 search results - page 57 / 1315
» Current Signatures: Application
Sort
View
TACAS
2010
Springer
245views Algorithms» more  TACAS 2010»
14 years 5 months ago
Stranger: An Automata-Based String Analysis Tool for PHP
STRANGER is an automata-based string analysis tool for finding and eliminating string-related security vulnerabilities in PHP applications. STRANGER uses symbolic forward and back...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
DCC
2006
IEEE
14 years 10 months ago
Index Calculation Attacks on RSA Signature and Encryption
At Crypto '85, Desmedt and Odlyzko described a chosen-ciphertext attack against plain RSA encryption. The technique can also be applied to RSA signatures and enables an existe...
Jean-Sébastien Coron, David Naccache, Yvo Desmedt...
EUROPKI
2007
Springer
14 years 5 months ago
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature sh...
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka...
CVPR
2006
IEEE
14 years 4 months ago
A Shape Representation for Planar Curves by Shape Signature Harmonic Embedding
This paper introduces a new representation for planar curves. From the well-known Dirichlet problem for a disk, the harmonic function embedded in a circular disk is solely depende...
Sang-Mook Lee, A. Lynn Abbott, Neil A. Clark, Phil...
ADBIS
2003
Springer
114views Database» more  ADBIS 2003»
14 years 4 months ago
Compressing Large Signature Trees
In this paper we present a new compression scheme for signature tree structures. Beyond the reduction of storage space, compression attains significant savings in terms of query pr...
Maria Kontaki, Yannis Manolopoulos, Alexandros Nan...