Java

Results: 11846



#Item
1Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1  Netherlands National Communication Security Agency (NLNCSA)

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-10-07 06:08:08
2Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1  Netherlands National Communication Security Agency (NLNCSA)

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26
3A Specification of Java Loading and Bytecode Verification Allen Goldberg Kestrel Institute 3260 Hillview Av. Palo Alto, CA 94304

A Specification of Java Loading and Bytecode Verification Allen Goldberg Kestrel Institute 3260 Hillview Av. Palo Alto, CA 94304

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-08 19:03:00
4Demand-Driven Context-Sensitive Alias Analysis for Java Dacong Yan Guoqing Xu  Atanas Rountev

Demand-Driven Context-Sensitive Alias Analysis for Java Dacong Yan Guoqing Xu Atanas Rountev

Add to Reading List

Source URL: dacongy.github.io

Language: English - Date: 2017-06-27 01:04:15
5Seuss for Java Language Reference Rajeev Joshi 1 12 FebruaryAbstract

Seuss for Java Language Reference Rajeev Joshi 1 12 FebruaryAbstract

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:26:03
6Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer  SIT, Email: philipp.holzinger@sit

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:15
7Uncovering Performance Problems in Java Applications with Reference Propagation Profiling 1  Dacong Yan1

Uncovering Performance Problems in Java Applications with Reference Propagation Profiling 1 Dacong Yan1

Add to Reading List

Source URL: dacongy.github.io

Language: English - Date: 2017-06-27 01:04:15
8LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1  School of Computer Science, University of Birmingham, UK

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
9Understanding Parallelism-Inhibiting Dependences in Sequential Java Programs Atanas Rountev∗, Kevin Van Valkenburgh†, Dacong Yan∗ and P. Sadayappan∗ ∗ Ohio  State University

Understanding Parallelism-Inhibiting Dependences in Sequential Java Programs Atanas Rountev∗, Kevin Van Valkenburgh†, Dacong Yan∗ and P. Sadayappan∗ ∗ Ohio State University

Add to Reading List

Source URL: dacongy.github.io

Language: English - Date: 2017-06-27 01:04:15
    10Using Java Pathfinder to Reason about Agent Systems Franco Raimondi  Department of Computer Science Middlesex University

    Using Java Pathfinder to Reason about Agent Systems Franco Raimondi Department of Computer Science Middlesex University

    Add to Reading List

    Source URL: cgi.csc.liv.ac.uk

    Language: English - Date: 2015-11-05 09:33:47