Sciweavers

4731 search results - page 13 / 947
» Securing Interactive Programs
Sort
View
CCS
1998
ACM
13 years 11 months ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...
SOUPS
2009
ACM
14 years 2 months ago
Privacy stories: confidence in privacy behaviors through end user programming
Luke Church, Jonathan Anderson, Joseph Bonneau, Fr...
IEEEARES
2007
IEEE
14 years 1 months ago
On Programming Models for Service-Level High Availability
Christian Engelmann, Stephen L. Scott, Chokchai Le...
OOPSLA
1997
Springer
13 years 11 months ago
Declarative Specialization of Object-Oriented Programs
Eugen-Nicolae Volanschi, Charles Consel, Gilles Mu...
MA
1997
Springer
149views Communications» more  MA 1997»
13 years 11 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...