Sciweavers

41 search results - page 9 / 9
» Prevention of Cross-Site Scripting Attacks on Current Web Ap...
Sort
View
ICICS
2005
Springer
13 years 10 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...