Sciweavers

3420 search results - page 594 / 684
» A Language-Based Approach to Security
Sort
View
IEEEIAS
2007
IEEE
14 years 4 months ago
An LSB Data Hiding Technique Using Prime Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically m...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
IPPS
2007
IEEE
14 years 4 months ago
Open Internet-based Sharing for Desktop Grids in iShare
This paper presents iShare, a distributed peer-to-peer Internet-sharing system, that facilitates the sharing of diverse resources located in different administrative domains over ...
Xiaojuan Ren, Ayon Basumallik, Zhelong Pan, Rudolf...
NDSS
2007
IEEE
14 years 4 months ago
Fig: Automatic Fingerprint Generation
Fingerprinting is a widely used technique among the networking and security communities for identifying different implementations of the same piece of networking software running ...
Shobha Venkataraman, Juan Caballero, Pongsin Poosa...
NDSS
2007
IEEE
14 years 4 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...
P2P
2007
IEEE
110views Communications» more  P2P 2007»
14 years 4 months ago
PISA: P2P Wi-Fi Internet Sharing Architecture
— The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. WiFi communities which allow their users to share their wired Internet conn...
Tobias Heer, Shaohui Li, Klaus Wehrle