Sciweavers

416 search results - page 5 / 84
» Some new approaches for preventing software tampering
Sort
View
IEEECIT
2009
IEEE
14 years 2 months ago
Clustering of Software Systems Using New Hybrid Algorithms
—Software clustering is a method for increasing software system understanding and maintenance. Software designers, first use MDG graph to model the structure of software system. ...
Ali Safari Mamaghani, Mohammad Reza Meybodi
IJNSEC
2007
154views more  IJNSEC 2007»
13 years 7 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
VAMOS
2009
Springer
14 years 1 months ago
Some Challenges of Feature-based Merging of Class Diagrams
In software product line engineering, feature models enable to automate the generation of productspecific models in conjunction with domain “base models” (e.g. UML models). T...
Germain Saval, Jorge Pinna Puissant, Patrick Heyma...
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
14 years 28 days ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
JTAER
2008
100views more  JTAER 2008»
13 years 7 months ago
Securing Uniqueness of Rights e-Documents: A Deontic Process Perspective
We typically think of documents as carrying information. However, certain kinds of documents do more than that: they are not only informative but also performative in that they re...
Ronald M. Lee, Vu Nguyen, Anastasia Pagnoni