Checking the correctness of memories
SFCS '91 Proceedings of the 32nd annual symposium on Foundations of computer science
Java security: hostile applets, holes&antidotes
Java security: hostile applets, holes&antidotes
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Cryptographic verification of test coverage claims
ESEC '97/FSE-5 Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering
REFEREE: trust management for Web applications
Selected papers from the sixth international conference on World Wide Web
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Java Virtual Machine Specification
Java Virtual Machine Specification
The Java Language Specification
The Java Language Specification
Research directions for automated software verification: using trusted hardware
ASE '97 Proceedings of the 12th international conference on Automated software engineering (formerly: KBSE)
Recent-secure authentication: enforcing revocation in distributed systems
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Proof linking: an architecture for modular verification of dynamically-linked mobile code
SIGSOFT '98/FSE-6 Proceedings of the 6th ACM SIGSOFT international symposium on Foundations of software engineering
Cryptographic Verification of Test Coverage Claims
IEEE Transactions on Software Engineering
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking
ACM Transactions on Software Engineering and Methodology (TOSEM)
Verification caching: towards efficient and secure mobile code execution environments
Proceedings of the 2002 ACM symposium on Applied computing
Using UMLsec and goal trees for secure systems development
Proceedings of the 2002 ACM symposium on Applied computing
Stack and Queue Integrity on Hostile Platforms
IEEE Transactions on Software Engineering
Risky trust: risk-based analysis of software systems
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Trust and tamper-proof software delivery
Proceedings of the 2006 international workshop on Software engineering for secure systems
Proof linking: distributed verification of java classfiles in the presence of multiple classloaders
JVM'01 Proceedings of the 2001 Symposium on JavaTM Virtual Machine Research and Technology Symposium - Volume 1
An embedded implementation of the Common Language Infrastructure
Journal of Systems Architecture: the EUROMICRO Journal
Hi-index | 0.03 |