Sciweavers

1527 search results - page 101 / 306
» A Survey of Web Security
Sort
View
WEBI
2009
Springer
15 years 6 months ago
Deriving Customized Integrated Web Query Interfaces
— Given a set of query interfaces from providers in the same domain (e.g., car rental), the goal is to build automatically an integrated interface that makes the access to indivi...
Eduard Constantin Dragut, Fang Fang, Clement T. Yu...
ESORICS
2011
Springer
13 years 11 months ago
A Systematic Analysis of XSS Sanitization in Web Application Frameworks
While most research on XSS defense has focused on techniques for securing existing applications and re-architecting browser mechanisms, sanitization remains the industry-standard d...
Joel Weinberger, Prateek Saxena, Devdatta Akhawe, ...
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
15 years 6 months ago
Fingerprinting Blank Paper Using Commodity Scanners
This paper presents a novel technique for authenticating physical documents based on random, naturally occurring imperfections in paper texture. We introduce a new method for meas...
William Clarkson, Tim Weyrich, Adam Finkelstein, N...
CCS
1993
ACM
15 years 3 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
TRUST
2010
Springer
14 years 10 months ago
The PUF Promise
Physical Uncloneable Functions (PUF) are systems whose physical behavior to different inputs can be measured reliably, yet cannot be cloned in a physical replica. Existing designs ...
Heike Busch, Miroslava Sotáková, Ste...