Sciweavers

1843 search results - page 10 / 369
» Securing Class Initialization
Sort
View
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 7 months ago
Soundly Handling Static Fields: Issues, Semantics and Analysis
Although in most cases class initialization works as expected, some static fields may be read before being initialized, despite being initialized in their corresponding class init...
Laurent Hubert, David Pichardie
ACISP
2001
Springer
13 years 12 months ago
On Classifying Conference Key Distribution Protocols
In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4...
Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Su...
ISPEC
2005
Springer
14 years 26 days ago
A New Class of Codes for Fingerprinting Schemes
Abstract. In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be u...
Marcel Fernandez, Miguel Soriano, Josep Cotrina Na...
CCS
2001
ACM
13 years 12 months ago
The faithfulness of abstract protocol analysis: message authentication
hfulness of Abstract Protocol Analysis: Message Authentication∗ Joshua D. Guttman F. Javier Thayer Lenore D. Zuck December 18, 2002 Dolev and Yao initiated an approach to studyi...
Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuc...
AISM
2004
13 years 8 months ago
Developing a framework for understanding Security Governance
With reported security incidents in organisations on the increase, effective Security Governance is expected to become a major issue in organisations. A research framework of Secu...
C. C. Terence Tan