Sciweavers

392 search results - page 26 / 79
» Security vulnerabilities in IEEE 802.22
Sort
View
SP
2010
IEEE
222views Security Privacy» more  SP 2010»
14 years 22 days ago
A Symbolic Execution Framework for JavaScript
—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...
IAW
2003
IEEE
14 years 2 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
13 years 10 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
INFOCOM
2006
IEEE
14 years 2 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang
IPPS
2005
IEEE
14 years 2 months ago
Security Enhancement in InfiniBand Architecture
The InfiniBandTM Architecture (IBA) is a new promising I/O communication standard positioned for building clusters and System Area Networks (SANs). However, the IBA specification ...
Manhee Lee, Eun Jung Kim, Mazin S. Yousif