Sciweavers

2846 search results - page 546 / 570
» Not one click for security
Sort
View
SAC
2006
ACM
15 years 10 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
CODES
2005
IEEE
15 years 9 months ago
High-level synthesis for large bit-width multipliers on FPGAs: a case study
In this paper, we present the analysis, design and implementation of an estimator to realize large bit width unsigned integer multiplier units. Larger multiplier units are require...
Gang Quan, James P. Davis, Siddhaveerasharan Devar...
EEE
2005
IEEE
15 years 9 months ago
On Comprehensive Contractual Descriptions of Web Services
Comprehensive contractual description of Web Services and Web Service compositions is needed for selection of appropriate Web Services and their service and quality of service (Qo...
Vladimir Tosic, Bernard Pagurek
FCCM
2005
IEEE
132views VLSI» more  FCCM 2005»
15 years 9 months ago
Hardware Factorization Based on Elliptic Curve Method
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of factoring large numbers. The best known method for factorization large integers is ...
Martin Simka, Jan Pelzl, Thorsten Kleinjung, Jens ...
ICEIS
2005
IEEE
15 years 9 months ago
Conditions for Interoperability
Abstract: Interoperability for information systems remains a challenge both at the semantic and organisational levels. The original three-level architecture for local databases nee...
B. Nick Rossiter, Michael A. Heather