We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
We consider the impact of different communication architectures on the performability (performance + availability) of cluster-based servers. In particular, we use a combination of ...
In this paper we present a methodology to analyze the behavior and performance of Java application servers using a performance analysis framework. This framework considers all lev...
Jordi Guitart, David Carrera, Jordi Torres, Eduard...
In this paper we describe JClarens; a Java based implementation of the Clarens remote data server. JClarens provides web services for an interactive analysis environment to dynami...
Arshad Ali, Ashiq Anjum, Tahir Azim, Michael Thoma...