Sciweavers

3486 search results - page 17 / 698
» On the Design and Security of RC2
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
SIGSOFT
2010
ACM
13 years 6 months ago
Software engineering issues for mobile application development
This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are devel...
Anthony I. Wasserman
CASES
2010
ACM
13 years 6 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
CCS
2004
ACM
14 years 2 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers
OOPSLA
2010
Springer
13 years 7 months ago
Almost free concurrency! (using GOF patterns)
We present a framework that provides concurrency-enhanced versions of the GOF object-oriented design patterns. The main benefit of our work is that if programmers improve program...
Sean L. Mooney, Hridesh Rajan, Steven M. Kautz, Wa...