Sciweavers

2904 search results - page 491 / 581
» Internet Infrastructure Security
Sort
View
ER
2004
Springer
169views Database» more  ER 2004»
14 years 4 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
INTERNET
2010
119views more  INTERNET 2010»
13 years 9 months ago
A Chat Application in Lift
s the HTTP request–response cycle rather than wrapping HTTP concepts in APIs. This means you put HTML element definition and action in the same place: var name = "" SHt...
David Pollak, Steve Vinoski
ICWS
2009
IEEE
14 years 7 months ago
Analysis of Signature Wrapping Attacks and Countermeasures
In recent research it turned out that Boolean verification of digital signatures in the context of WSSecurity is likely to fail: If parts of a SOAP message are signed and the sig...
Sebastian Gajek, Meiko Jensen, Lijun Liao, Jö...
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
14 years 7 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
IPOM
2009
Springer
14 years 5 months ago
A Labeled Data Set for Flow-Based Intrusion Detection
Abstract. Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field...
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko ...