This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Web 2.0 is much more than adding a nice facade to old web applications rather it is a new way of thinking about software architecture of Rich Internet Applications (RIA). In compar...
Amirreza Tahamtan, Amin Anjomshoaa, Edgar Weippl, ...
Web applications divide their state between the client and the server. The frequent and highly dynamic client-server communication that is characteristic of modern web application...