Sfoglia per Autore  Gadyatskaya, Olga

Opzioni
Mostrati risultati da 1 a 17 di 17
Titolo Anno di pubblicazione Autori Unitn File
Dynamic Resiliency to User Assignment 1-gen-2010 Massacci, FabioGadyatskaya, OlgaPaci, Federica
Can we support applications' evolution in multi-application smart cards by security-by-contract? 1-gen-2010 Gadyatskaya, OlgaMassacci, Fabio +
Load Time Security Verification: The Claim Checker 1-gen-2011 Gadyatskaya, OlgaLostal, EduardoMassacci, Fabio
A Load Time Policy Checker for Open Multi-application Smart Cards 1-gen-2011 Gadyatskaya, OlgaMassacci, Fabio +
Load Time Security Verification 1-gen-2011 Gadyatskaya, OlgaMassacci, Fabio +
Load Time Code Validation for Mobile Phone Java Cards 1-gen-2012 Massacci, FabioGadyatskaya, Olga +
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications 1-gen-2012 Gadyatskaya, OlgaMassacci, FabioPaci, Federica +
High-level algorithms and data structures requirements for security-by-contract on Java cards 1-gen-2012 Gadyatskaya, OlgaMassacci, FabioPhilippov, Anton +
Security-by-Contract for the OSGi platform 1-gen-2012 Gadyatskaya, OlgaMassacci, FabioPhilippov, Anton
Security of the OSGi platform 1-gen-2012 Philippov, AntonGadyatskaya, OlgaMassacci, Fabio
TruStore: Implementing a Trusted Store for Android 1-gen-2013 Yury, ZhauniarovichBruno, CrispoOlga, Gadyatskaya
Load time code validation for mobile phone Java Cards 1-gen-2013 Gadyatskaya, OlgaMassacci, Fabio +
Controlling application interactions on the novel smart cards with security-by-contract 1-gen-2013 Gadyatskaya, OlgaMassacci, Fabio
MAP-REDUCE Runtime Enforcement of Information Flow Policies 1-gen-2013 Ngo, Nguyen Nhat MinhMassacci, FabioGadyatskaya, Olga
Security in the Firefox OS and Tizen mobile platforms 1-gen-2014 Gadyatskaya, OlgaMassacci, FabioZhauniarovich, Yury
An empirical study of the technology transfer potential of EU security and trust R&D projects 1-gen-2014 De Gramatica, MartinaMassacci, FabioGadyatskaya, Olga
StaDynA: Addressing the problem of dynamic code updates in the security analysis of android applications 1-gen-2015 Zhauniarovich, YuryAhmad, MaqsoodGadyatskaya, OlgaCrispo, BrunoMassacci, Fabio
Mostrati risultati da 1 a 17 di 17
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile