Sciweavers

4731 search results - page 183 / 947
» Securing Interactive Programs
Sort
View
ASM
2010
ASM
14 years 7 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
ICALP
2005
Springer
14 years 3 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
WORDS
2003
IEEE
14 years 3 months ago
Security and Middleware
The security features of current middleware platforms, like Enterprise Java Beans and CORBA, are either simple and limited or complex and difficult to use. In both cases are the ...
Anders Andersen, Gordon S. Blair, Per Harald Myrva...
ACSAC
2002
IEEE
14 years 3 months ago
With Gaming Technology towards Secure User Interfaces
Technology aimed at making life easier for game developers is an issue of controversy among security experts. Objections arise out of concerns of stability of a gamefriendly platf...
Hanno Langweg
CCS
2011
ACM
12 years 10 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka