Sciweavers

2036 search results - page 30 / 408
» Using and Abusing XML
Sort
View
DKE
2006
126views more  DKE 2006»
13 years 10 months ago
FRACTURE mining: Mining frequently and concurrently mutating structures from historical XML documents
In the past few years, the fast proliferation of available XML documents has stimulated a great deal of interest in discovering hidden and nontrivial knowledge from XML repositori...
Ling Chen 0002, Sourav S. Bhowmick, Liang-Tien Chi...
FC
2005
Springer
94views Cryptology» more  FC 2005»
14 years 3 months ago
Modeling and Preventing Phishing Attacks
We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new mod...
Markus Jakobsson
CHES
2001
Springer
98views Cryptology» more  CHES 2001»
14 years 2 months ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two...
Mike Bond
USS
2008
14 years 13 days ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
IADIS
2004
13 years 11 months ago
IDUX: Internationalization of Data Using XML
Interest is rapidly growing in internationalized software that can be localized to various languages. This paper describes IDUX, an XML-based system designed to support the proces...
Darcy G. Benoit, Tomasz Müldner