Sciweavers

2036 search results - page 127 / 408
» Using and Abusing XML
Sort
View
135
Voted
ASE
2002
137views more  ASE 2002»
15 years 2 months ago
The DSD Schema Language
XML (Extensible Markup Language), a linear syntax for trees, has gathered a remarkable amount of interest in industry. The acceptance of XML opens new venues for the application o...
Nils Klarlund, Anders Møller, Michael I. Sc...
93
Voted
IJISEC
2002
52views more  IJISEC 2002»
15 years 2 months ago
Securing SOAP e-services
Remote service invocation via HTTP and XML promises to become an important component of the Internet infrastructure. Work is ongoing in the W3C XML Protocol Working Group to define...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
94
Voted
CCS
2003
ACM
15 years 7 months ago
The blocker tag: selective blocking of RFID tags for consumer privacy
We propose the use of “selective blocking” by “blocker tags” as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or...
Ari Juels, Ronald L. Rivest, Michael Szydlo
153
Voted
IJISEC
2006
119views more  IJISEC 2006»
15 years 2 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
132
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Identifying mobiles hiding behind wireless routers
—The network address translation technique (NAT) is widely used in wireless routers. It is a low cost solution to IPv4 address space limitations. However, cyber criminals may abu...
Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, ...