Sciweavers

2897 search results - page 28 / 580
» Mobile Code Security
Sort
View
JSS
2010
111views more  JSS 2010»
13 years 8 months ago
Promoting the development of secure mobile agent applications
In this paper we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile...
Carles Garrigues, Sergi Robles, Joan Borrell, Guil...
JPDC
2006
141views more  JPDC 2006»
13 years 10 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
OOPSLA
1999
Springer
14 years 2 months ago
Subject-Oriented Design: Towards Improved Alignment of Requirements, Design, and Code
Siobhán Clarke, William H. Harrison, Harold...
ESORICS
2008
Springer
13 years 12 months ago
New Considerations about the Correct Design of Turbo Fingerprinting Codes
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
CCS
2010
ACM
13 years 10 months ago
Mimimorphism: a new approach to binary code obfuscation
Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, Hainin...