Sciweavers

119 search results - page 18 / 24
» Explore Exploit Schemes for Web Content Optimization
Sort
View
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 1 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
CAD
2004
Springer
13 years 7 months ago
Customizability analysis in design for mass customization
Product customization has been recognized as an effective means to implement mass customization. This paper focuses on the customizability issue of design, that is, to evaluate th...
Jianxin Jiao, Mitchell M. Tseng
WWW
2007
ACM
14 years 8 months ago
Efficient search in large textual collections with redundancy
Current web search engines focus on searching only the most recent snapshot of the web. In some cases, however, it would be desirable to search over collections that include many ...
Jiangong Zhang, Torsten Suel
ICCS
2005
Springer
14 years 1 months ago
Querying a Bioinformatic Data Sources Registry with Concept Lattices
Abstract Bioinformatic data sources available on the web are multiple and heterogenous. The lack of documentation and the difficulty of interaction with these data banks require us...
Nizar Messai, Marie-Dominique Devignes, Amedeo Nap...
USS
2008
13 years 10 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam