-
2
-
-
33646430362
-
-
J. Agat. Transforming out Timing Leaks in Practice, chapter II from [3]. Department of Computing Science Chalmers University of Technology and Göteborg University, September 2000
-
-
-
-
3
-
-
33646413210
-
-
J. Agat. Type Based Techniques for Covert Channel Elimination and Register Allocation. Ph thesis, Department of Computing Science Chalmers University of Technology and Göteborg University, SE-412 96 Göteborg, Sweden, December 2000
-
-
-
-
5
-
-
33646435132
-
-
A. Banerjee and D. Naumann. Stack-Based Access Control for Secure Information Flow. Journal of Functional Programming, 200x. Special Issue on Language-Based Security, To appear
-
-
-
-
6
-
-
4944265699
-
Secure Information Flow by Self-Composition
-
Foccardi R. (Ed), IEEE Press
-
Barthe G., D'Argenio P., and Rezk T. Secure Information Flow by Self-Composition. In: Foccardi R. (Ed). Proceedings of CSFW'04 (2004), IEEE Press 100-114
-
(2004)
Proceedings of CSFW'04
, pp. 100-114
-
-
Barthe, G.1
D'Argenio, P.2
Rezk, T.3
-
8
-
-
25844442786
-
ESC/Java2: Uniting ESC/Java and JML
-
Proceedings of CASSIS: Construction and Analysis of Safe, Secure and Interoperable Smart devices. Barthe G., Burdy L., Huisman M., Lanet J.-L., and Muntean T. (Eds), Springer-Verlag
-
Cok D.R., and Kiniry J.R. ESC/Java2: Uniting ESC/Java and JML. In: Barthe G., Burdy L., Huisman M., Lanet J.-L., and Muntean T. (Eds). Proceedings of CASSIS: Construction and Analysis of Safe, Secure and Interoperable Smart devices. LNCS volume 3362 (2004), Springer-Verlag 108-128
-
(2004)
LNCS
, vol.3362
, pp. 108-128
-
-
Cok, D.R.1
Kiniry, J.R.2
-
10
-
-
28044445125
-
Timing Aware Information Flow Security for a JavaCard-like Bytecode
-
First Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE) proceedings. Spoto F. (Ed) ELsevier
-
Hedin D., and Sands D. Timing Aware Information Flow Security for a JavaCard-like Bytecode. In: Spoto F. (Ed). First Workshop on Bytecode Semantics, Verification, Analysis and Transformation (BYTECODE) proceedings. ENTCS (2005) 149-166 ELsevier
-
(2005)
ENTCS
, pp. 149-166
-
-
Hedin, D.1
Sands, D.2
-
11
-
-
84943632039
-
Timing attacks on implementations of diffie-helman, rsa, dss, and other systems
-
Advances in Cryptology - CRYPTO'96. Koblitz N. (Ed), Springer-Verlag
-
Kocher P.C. Timing attacks on implementations of diffie-helman, rsa, dss, and other systems. In: Koblitz N. (Ed). Advances in Cryptology - CRYPTO'96. LNCS volume 1109 (1996), Springer-Verlag 104-113
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
13
-
-
0015672289
-
A note on the Confinement Problem
-
Lampson B.W. A note on the Confinement Problem. Communications of the ACM 16 10 (1973) 613-615
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
14
-
-
33646429272
-
-
S. Lecomte, G. Grimaud, and D. Donsez. Implementation of Transactional Mechanisms for Open SmartCard. In GEMPLUS Developer Conference, 1999
-
-
-
-
16
-
-
33646432551
-
-
J.E.B. Moss. Nested Transactions: An Approach to Reliable Distributed Computing. PhD thesis, MIT, 1981
-
-
-
|