共 50 条
- [31] TINMAN: A resource bound security checking system for mobile code COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 178 - 193
- [32] Mobile code security by Java']Java bytecode dependence analysis IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
- [34] Using reflection as a mechanism for enforcing security policies in mobile code COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 309 - 323
- [36] A trusted source-based model of mobile code security PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2154 - 2157
- [37] On the Security Loss in Cryptographic Reductions ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 72 - 87
- [38] Hiding Cliques for Cryptographic Security Designs, Codes and Cryptography, 2000, 20 : 269 - 280
- [39] Security and cryptographic hardware implementations Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 768 - 769