Sciweavers

6 search results - page 2 / 2
» WASP: Protecting Web Applications Using Positive Tainting an...
Sort
View
ICICS
2005
Springer
14 years 4 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...