—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
In this paper we develop a security verification framework for open source software with a multi-language support. We base our approach on the GCC compiler which is considered as ...
We study the effectiveness of garbage collection (GC) algorithms by measuring the time difference between the actual collection time of an object and the potential earliest collec...
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
The Safety Critical Java Specification intends to support the development of programs that must be certified. The specification includes a number of annotations used to constrain ...