Sciweavers

867 search results - page 126 / 174
» Secure Input for Web Applications
Sort
View
CSI
2007
192views more  CSI 2007»
13 years 9 months ago
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved sc...
Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhamma...
DIM
2008
ACM
13 years 10 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
SEMWEB
2004
Springer
14 years 2 months ago
Learning Meta-descriptions of the FOAF Network
We argue that in a distributed context, such as the Semantic Web, ontology engineers and data creators often cannot control (or even imagine) the possible uses their data or ontolo...
Gunnar Aastrand Grimnes, Peter Edwards, Alun D. Pr...
SPIRE
2005
Springer
14 years 2 months ago
Experimental Analysis of a Fast Intersection Algorithm for Sorted Sequences
Abstract. This work presents an experimental comparison of intersection algorithms for sorted sequences, including the recent algorithm of Baeza-Yates. This algorithm performs on a...
Ricardo A. Baeza-Yates, Alejandro Salinger
IC
2009
13 years 6 months ago
Usage Number of Pages Found by Search Engines for Business Analytics
- In this paper, we describe the usage of number of web pages found by search engines for business analysis. To realize this approach we created the GoogMeter application (www.goog...
Alexandre Zolotovitski, Richard Castro