Sciweavers

894 search results - page 123 / 179
» Secure Implementation of Channel Abstractions
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
Isolating JavaScript with Filters, Rewriting, and Wrappers
Abstract. We study methods that allow web sites to safely combine JavaScript from untrusted sources. If implemented properly, filters can prevent dangerous code from loading into t...
Sergio Maffeis, John C. Mitchell, Ankur Taly
CIA
1998
Springer
14 years 1 months ago
Enhancing Mobile Agents with Electronic Commerce Capabilities
The paradigm of mobile agents offers a powerful and flexible ity to develop distributed applications on a high-level of abstraction. One of the most interesting tasks for mobile ag...
Hartmut Vogler, Marie-Luise Moschgath, Thomas Kunk...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
14 years 29 days ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
CC
2003
Springer
102views System Software» more  CC 2003»
14 years 2 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
EUROPAR
2010
Springer
13 years 10 months ago
Parallel Enumeration of Shortest Lattice Vectors
Abstract. Lattice basis reduction is the problem of finding short vectors in lattices. The security of lattice based cryptosystems is based on the hardness of lattice reduction. Fu...
Özgür Dagdelen, Michael Schneider 0002