共 50 条
- [41] A secure object sharing scheme for Java']Java Card INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 243 - 251
- [42] Secure object flow analysis for Java']Java Card USENIX ASSOCIATION AND IFIP WG 8.8 (SMART CARDS) PROCEEDINGS OF CARDIS '02 FIFTH SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE, 2002, : 97 - 110
- [43] Experience with secure multi-processing in Java']Java 18TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 1998, : 398 - 405
- [44] Java']Java parallel secure stream for grid computing PROCEEDINGS OF CHEP 2001, 2001, : 668 - 671
- [45] Secure Coding Practices in Java']Java: Challenges and Vulnerabilities PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 372 - 383
- [46] A secure environment for untrusted helper applications - Confining the wily hacker PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 1 - 13
- [49] Virtual Environment for Evaluating the QoS of Distributed Mobile Applications 2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2021, : 407 - 409
- [50] How to Run GUI Applications on a Java Development Environment Based on JupyterLab Lecture Notes on Data Engineering and Communications Technologies, 2024, 199 : 286 - 297