119
Voted
ESORICS
16 years 1 months ago
2009 Springer
Cross-site scripting (XSS) vulnerabilities make it possible for worms to spread quickly to a broad range of users on popular Web sites. To date, the detection of XSS worms has been...
100
click to vote
ESORICS
16 years 1 months ago
2009 Springer
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
106
Voted
ESORICS
15 years 7 months ago
2009 Springer
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
100
click to vote
ESORICS
15 years 7 months ago
2009 Springer
Abstract. The ubiquity of smartphones and other location-aware handheld devices has resulted in a dramatic increase in popularity of locationbased services (LBS) tailored to user l...
104
click to vote
ESORICS
16 years 1 months ago
2009 Springer
We propose a probabilistic contract signing protocol that achieves balance even in the presence of an adversary that may delay messages sent over secure channels. To show that this...
|