Sciweavers

1801 search results - page 250 / 361
» Implementation-Oriented Secure Architectures
Sort
View
110
Voted
ACSAC
2003
IEEE
15 years 9 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
131
Voted
HOTOS
2003
IEEE
15 years 9 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
114
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
OOPSLA
2009
Springer
15 years 8 months ago
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09)
We will discuss here the theoretical, social, technological and practical issues related to quality aspects of software patterns including security and safety aspects. The worksho...
Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. ...
144
Voted
MMMACNS
2001
Springer
15 years 8 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato