Currently the developing process for enterprise applications is improved by the Service Oriented Architecture (SOA) paradigms. With SOAs the creation of modular and clearly defin...
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Recently, a new web development technique for creating interactive web applications, dubbed AJAX, has emerged in response to the limited degree of interactivity in large-grain sta...