Sciweavers

SP
1998
IEEE
174views Security Privacy» more  SP 1998»
14 years 3 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
14 years 3 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
14 years 3 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
SP
1998
IEEE
114views Security Privacy» more  SP 1998»
14 years 3 months ago
Detecting Disruptive Routers: A Distributed Network Monitoring Approach
Kirk A. Bradley, Steven Cheung, Nicholas J. Puketz...
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
14 years 3 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
SP
1998
IEEE
147views Security Privacy» more  SP 1998»
14 years 3 months ago
Secure Execution of Java Applets using a Remote Playground
Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 3 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SP
1998
IEEE
14 years 3 months ago
Stack and Queue Integrity on Hostile Platforms
When computationally intensive tasks have to be carried out on trusted, but limited, platforms such as smart cards, it becomes necessary to compensate for the limited resources me...
Premkumar T. Devanbu, Stuart G. Stubblebine
SPW
1999
Springer
14 years 3 months ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson
SPW
1999
Springer
14 years 3 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe