Sciweavers

35 search results - page 1 / 7
» jcs 2006
Sort
View
97
Voted
JCS
2002
63views more  JCS 2002»
15 years 3 months ago
Eliminating Counterevidence with Applications to Accountable Certificate Management
Ahto Buldas, Peeter Laud, Helger Lipmaa
88
Voted
JCS
1998
85views more  JCS 1998»
15 years 3 months ago
The Inductive Approach to Verifying Cryptographic Protocols
Lawrence C. Paulson
111
Voted
JCS
2010
104views more  JCS 2010»
15 years 2 months ago
Static analysis for detecting taint-style vulnerabilities in web applications
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
94
Voted
JCS
2010
82views more  JCS 2010»
15 years 2 months ago
Independence from obfuscation: A semantic framework for diversity
Riccardo Pucella, Fred B. Schneider