Sciweavers

2517 search results - page 452 / 504
» Secure Deployment of Components
Sort
View
IJISEC
2006
106views more  IJISEC 2006»
13 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
IJSN
2006
140views more  IJSN 2006»
13 years 8 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 8 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
COMCOM
2000
125views more  COMCOM 2000»
13 years 8 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
CONCURRENCY
2002
122views more  CONCURRENCY 2002»
13 years 8 months ago
The Grid Portal Development Kit
Computational science portals are emerging as useful and necessary interfaces for performing operations on the Grid. The Grid Portal Development Kit (GPDK) facilitates the develop...
Jason Novotny