The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
Ellick Chan, Shivaram Venkataraman, Francis M. Dav...
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Abstract. Current challenges on the markets cause companies to interact with one another and strive after becoming members of virtual organizations assuming that in doing so they c...
We propose an architecture that preserves user privacy in the semantic Web via tag suppression. In tag suppression, users may wish to tag some resources and refrain from tagging so...
Javier Parra-Arnau, David Rebollo-Monedero, Jordi ...
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...