Sciweavers

28 search results - page 6 / 6
» No free lunch in data privacy
Sort
View
CSFW
2003
IEEE
13 years 10 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
CHI
2008
ACM
14 years 5 months ago
Ingimp: introducing instrumentation to an end-user open source application
Open source projects are gradually incorporating usability methods into their development practices, but there are still many unmet needs. One particular need for nearly any open ...
Michael Terry, Matthew Kay, Brad Van Vugt, Brandon...
JDFP
2006
139views more  JDFP 2006»
13 years 5 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer