Sciweavers

104 search results - page 6 / 21
» The Emperor's New Security Indicators
Sort
View
JTAER
2010
121views more  JTAER 2010»
13 years 5 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
GLOBECOM
2008
IEEE
13 years 8 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair
INTERACT
2007
13 years 8 months ago
ICEbox: Toward Easy-to-Use Home Networking
Home networking is becoming an essential part of everyday life. However, empirical studies and consumer reports indicate that the complexities of configuring and maintaining the ho...
Jeonghwa Yang, W. Keith Edwards
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
13 years 11 months ago
Towards a Generic Process for Security Pattern Integration
Abstract--Interdependencies between different security patterns can influence the properties of a particular pattern when applied in conjunction with other patterns. The resulting ...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
SUTC
2008
IEEE
14 years 1 months ago
On the Security of the Full-Band Image Watermark for Copyright Protection
Digital watermarks have been embedded invisibly in digital media to protect copy rights of legal owners. The embedded watermarks can be extracted to indicate ownership originals. ...
Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han