Sciweavers

518 search results - page 50 / 104
» Abstract Interpretation-Based Protection
Sort
View
ER
2009
Springer
104views Database» more  ER 2009»
15 years 9 months ago
Modelling Safe Interface Interactions in Web Applications
Abstract. Current Web applications embed sophisticated user interfaces and business logic. The original interaction paradigm of the Web based on static content pages that are brows...
Marco Brambilla, Jordi Cabot, Michael Grossniklaus
COLCOM
2008
IEEE
15 years 9 months ago
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access
Abstract. The original purpose of Web metadata was to protect endusers from possible harmful content and to simplify search and retrieval. However they can also be exploited in mor...
Barbara Carminati, Elena Ferrari, Andrea Perego
89
Voted
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 9 months ago
Lightweight Security for Network Coding
Abstract—Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different dat...
João P. Vilela, Luísa Lima, Jo&atild...
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
15 years 9 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
101
Voted
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
15 years 9 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont