Sciweavers

3568 search results - page 50 / 714
» Type Analysis for JavaScript
Sort
View
ACSC
2007
IEEE
13 years 12 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
DIMVA
2006
13 years 9 months ago
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs
Incomplete or improper input validation is one of the major sources of security bugs in programs. While traditional approaches often focus on detecting string related buffer overfl...
Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Kar...
JCS
2007
120views more  JCS 2007»
13 years 7 months ago
Dynamic types for authentication
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
ACL
2009
13 years 5 months ago
Chinese Term Extraction Using Different Types of Relevance
This paper presents a new term extraction approach using relevance between term candidates calculated by a link analysis based method. Different types of relevance are used separa...
Yuhang Yang, Tiejun Zhao, Qin Lu, Dequan Zheng, Ha...
ISCAS
2007
IEEE
103views Hardware» more  ISCAS 2007»
14 years 2 months ago
Hopf-Type Intermediate-Scale Bifurcation in Single-Stage Power-Factor-Correction Power Supplies
— This paper reports intermediate-scale instability in a single-stage power-factor-correction (PFC) power supply that employs a cascade configuration of a boost stage operating ...
Dong Dai, Shengnan Li, Xikui Ma, Chi K. Michael Ts...