Sciweavers

4731 search results - page 24 / 947
» Securing Interactive Programs
Sort
View
GCC
2003
Springer
14 years 22 days ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
FIW
2009
120views Communications» more  FIW 2009»
13 years 5 months ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan
OOPSLA
2004
Springer
14 years 26 days ago
greenfoot: combining object visualisation with interaction
Poul Henriksen, Michael Kölling
EUROCRYPT
2008
Springer
13 years 9 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai