Sciweavers

4731 search results - page 168 / 947
» Securing Interactive Programs
Sort
View
ICSE
2009
IEEE-ACM
13 years 6 months ago
SmartTutor: Creating IDE-based interactive tutorials via editable replay
Interactive tutorials, like Eclipse's cheat sheets, are good for novice programmers to learn how to perform tasks (e.g., checking out a CVS project) in an Integrated Developm...
Ying Zhang, Gang Huang, Nuyun Zhang, Hong Mei
ESORICS
2005
Springer
14 years 2 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
APGV
2008
ACM
164views Visualization» more  APGV 2008»
13 years 11 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...
CSCWD
2008
Springer
13 years 11 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li
ICFP
2009
ACM
14 years 3 months ago
Experience report: ocsigen, a web programming framework
The evolution of Web sites towards very dynamic applications makes it necessary to reconsider current Web programming technologies. We believe that Web development would benefit ...
Vincent Balat, Jérôme Vouillon, Boris...