Sciweavers

985 search results - page 48 / 197
» On the validity of digital signatures
Sort
View
CPP
2011
99views more  CPP 2011»
12 years 8 months ago
Proof-Carrying Code in a Session-Typed Process Calculus
Abstract. Dependent session types allow us to describe not only properties of the I/O behavior of processes but also of the exchanged data. In this paper we show how to exploit dep...
Frank Pfenning, Luís Caires, Bernardo Tonin...
HICSS
2002
IEEE
115views Biometrics» more  HICSS 2002»
14 years 1 months ago
Hermes--A Lean M-commerce Software Platform Utilizing Electronic Signatures
The world-wide growth of the mobile-telephony market opens the door for mobile commerce (m-commerce). For the restricted target platforms used for m-commerce such as mobile phones...
Sebastian Fischmeister, Günther Hagleitner, W...
ACSAC
2009
IEEE
14 years 3 months ago
FPValidator: Validating Type Equivalence of Function Pointers on the Fly
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Hua Wang, Yao Guo, Xiangqun Chen
ICPR
2004
IEEE
14 years 10 months ago
Using Adapted Levenshtein Distance for On-Line Signature Authentication
In this paper a new method for on-line signature authentication will be presented, which is based on a event-string modelling of features derived from pen-position and pressure si...
Sascha Schimke, Claus Vielhauer, Jana Dittmann
ICWS
2009
IEEE
14 years 6 months ago
Analysis of Signature Wrapping Attacks and Countermeasures
In recent research it turned out that Boolean verification of digital signatures in the context of WSSecurity is likely to fail: If parts of a SOAP message are signed and the sig...
Sebastian Gajek, Meiko Jensen, Lijun Liao, Jö...