Sciweavers

6574 search results - page 57 / 1315
» Current Signatures: Application
Sort
View
TACAS
2010
Springer
245views Algorithms» more  TACAS 2010»
15 years 7 months ago
Stranger: An Automata-Based String Analysis Tool for PHP
STRANGER is an automata-based string analysis tool for finding and eliminating string-related security vulnerabilities in PHP applications. STRANGER uses symbolic forward and back...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
54
Voted
DCC
2006
IEEE
16 years 7 days ago
Index Calculation Attacks on RSA Signature and Encryption
At Crypto '85, Desmedt and Odlyzko described a chosen-ciphertext attack against plain RSA encryption. The technique can also be applied to RSA signatures and enables an existe...
Jean-Sébastien Coron, David Naccache, Yvo Desmedt...
92
Voted
EUROPKI
2007
Springer
15 years 6 months ago
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature sh...
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka...
100
Voted
CVPR
2006
IEEE
15 years 6 months ago
A Shape Representation for Planar Curves by Shape Signature Harmonic Embedding
This paper introduces a new representation for planar curves. From the well-known Dirichlet problem for a disk, the harmonic function embedded in a circular disk is solely depende...
Sang-Mook Lee, A. Lynn Abbott, Neil A. Clark, Phil...
83
Voted
ADBIS
2003
Springer
114views Database» more  ADBIS 2003»
15 years 5 months ago
Compressing Large Signature Trees
In this paper we present a new compression scheme for signature tree structures. Beyond the reduction of storage space, compression attains significant savings in terms of query pr...
Maria Kontaki, Yannis Manolopoulos, Alexandros Nan...