Sciweavers

1317 search results - page 82 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
ESSOS
2009
Springer
15 years 9 months ago
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson
IEEESCC
2007
IEEE
15 years 11 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
EUROCRYPT
2010
Springer
15 years 9 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
IHI
2010
126views Healthcare» more  IHI 2010»
14 years 11 months ago
Designing a personal health application for older adults to manage medications
Older adults with multiple chronic conditions are prone to care transitions, such as seeing a new doctor or being discharged after a prolonged hospital stay. These transitions are...
Danish Ullah Khan, Katie A. Siek, Jane Meyers, Lea...
DAC
2012
ACM
13 years 7 months ago
Statistical design and optimization for adaptive post-silicon tuning of MEMS filters
Large-scale process variations can significantly limit the practical utility of microelectro-mechanical systems (MEMS) for RF (radio frequency) applications. In this paper we desc...
Fa Wang, Gokce Keskin, Andrew Phelps, Jonathan Rot...