Sciweavers

867 search results - page 24 / 174
» Secure Input for Web Applications
Sort
View
ICST
2011
IEEE
12 years 11 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
CHI
2000
ACM
14 years 1 days ago
Two-handed input using a PDA and a mouse
We performed several experiments using a Personal Digital Assistant (PDA) as an input device in the nondominant hand along with a mouse in the dominant hand. A PDA is a small hand...
Brad A. Myers, Kin Pou Lie, Bo-Chieh Yang
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 7 months ago
Maximal Intersection Queries in Randomized Input Models
Consider a family of sets and a single set, called the query set. How can one quickly find a member of the family which has a maximal intersection with the query set? Time constra...
Benjamin Hoffmann, Mikhail Lifshits, Yury Lifshits...
ICIW
2007
IEEE
13 years 7 months ago
Pyndorama, Integrating Web Learning System in a Single Application
Notwithstanding all the technology being invested  in education, students still have to cope with a massive  input   of   instructional   information.   Howeve...
Carlo E. T. de Oliveira, Livia M. Castro, Luiz G. ...
CCS
2010
ACM
13 years 7 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...