147
click to vote
ESORICS
16 years 4 months ago
2009 Springer
Cross-site scripting (XSS) vulnerabilities make it possible for worms to spread quickly to a broad range of users on popular Web sites. To date, the detection of XSS worms has been...
135
click to vote
ESORICS
16 years 4 months ago
2009 Springer
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
140
click to vote
ESORICS
15 years 10 months ago
2009 Springer
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
137
click to vote
ESORICS
15 years 10 months ago
2009 Springer
Abstract. The ubiquity of smartphones and other location-aware handheld devices has resulted in a dramatic increase in popularity of locationbased services (LBS) tailored to user l...
135
click to vote
ESORICS
16 years 4 months ago
2009 Springer
We propose a probabilistic contract signing protocol that achieves balance even in the presence of an adversary that may delay messages sent over secure channels. To show that this...
|