Sciweavers

867 search results - page 76 / 174
» Secure Input for Web Applications
Sort
View
JDWM
2010
139views more  JDWM 2010»
13 years 7 months ago
Mining Frequent Generalized Patterns for Web Personalization in the Presence of Taxonomies
The Web is a continuously evolving environment, since its content is updated on a regular basis. As a result, the traditional usagebased approach to generate recommendations that ...
Panagiotis Giannikopoulos, Iraklis Varlamis, Magda...
ESWS
2008
Springer
13 years 11 months ago
An User Interface Adaptation Architecture for Rich Internet Applications
Abstract. The need for adaptive and personalized Rich Internet Application puts a new dimension to already existing approaches of Adaptive Hypermedia Systems. Instead of computing ...
Kay-Uwe Schmidt, Jörg Dörflinger, Tirdad...
CRYPTO
2012
Springer
237views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Tweakable Blockciphers with Beyond Birthday-Bound Security
Liskov, Rivest and Wagner formalized the tweakable blockcipher (TBC) primitive at CRYPTO’02. The typical recipe for instantiating a TBC is to start with a blockcipher, and then b...
Will Landecker, Thomas Shrimpton, R. Seth Terashim...
CCS
2006
ACM
14 years 25 days ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
TMC
2011
164views more  TMC 2011»
13 years 4 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger