Javascript must be enabled to use this site. Please enable Javascript in your browser and try again. AARP offers savings & planning resources for all. Members also ...
Abstract: Minimal linear codes have significant applications in secret sharing schemes and secure two-party computation. There are several methods to construct linear codes, one of which is based on ...
You can download actual release of our JavaScript library and the use it for your project or you can fork our repository.
Abstract: Control-hijacking attacks include code injection attacks and code reuse attacks. In recent years, with the emergence of the defense mechanism data-execution prevention(DEP), code reuse ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results