Mobile platforms operate under fundamentally different trust assumptions than we relied on for web security. Your mobile ...
Abstract: Minimal linear codes have significant applications in secret sharing schemes and secure two-party computation. There are several methods to construct linear codes, one of which is based on ...
You can download actual release of our JavaScript library and the use it for your project or you can fork our repository.
jSH is a script interpreter for DOS based operating systems like MS-DOS, FreeDOS or any DOS based Windows (like 95, 98, ME). The focus is on file io and text mode user interfaces. jSH is a small side ...
Abstract: Control-hijacking attacks include code injection attacks and code reuse attacks. In recent years, with the emergence of the defense mechanism data-execution prevention(DEP), code reuse ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results