: In the last decade many governments have created e-services in order to deliver instant and advanced services to their citizens. One of the major transactions between the state a...
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
The world-wide web has become the most important information source for most of us. Unfortunately, there is no guarantee for the correctness of information on the web. Moreover, d...
— To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this w...
Interaction problems occur when small-screen devices (PDAs, Palmtops etc) are used to access Web pages designed for conventional, largescreen displays. To overcome some of these pr...