In a communication network, there always exist some specific servers that should be considered a critical infrastructure to be protected, specially due to the nature of the servic...
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...
This paper presents a service oriented architecture for testing Web Services. In this architecture, various parties interoperate with each other to complete testing tasks through ...
This paper analyzes the opportunities offered by information and communication technologies (ICTs) and the related ethical issues they raise within the transparency practices of...