Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
Digitization of information, the rise of the World Wide Web, and the development of new means for information creation, production and dissemination place new strains on the legal...
"Petimo" is an interactive robotic toy designed to protect children from potential risks in social networks and the virtual world and helps them to make a safely connect...
Adrian David Cheok, Owen Noel Newton Fernando, Cha...