Sciweavers

641 search results - page 36 / 129
» Implementation and use of the PLT scheme Web server
Sort
View
SAC
2009
ACM
15 years 4 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
ICWE
2004
Springer
15 years 3 months ago
A System for Interactive Authorization for Business Processes for Web Services
Business Processes for Web 1 Services are the new paradigm for virtual organization. In such cross organizational partnerships no business partner may guess a priori what kind of c...
Hristo Koshutanski, Fabio Massacci
ACSAC
2002
IEEE
15 years 2 months ago
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption
The blooming e-commerce is demanding better methods to protect online users' privacy, especially the credit card information that is widely used in online shopping. Holding a...
Donghua Xu, Chenghuai Lu, André L. M. dos S...

Book
355views
16 years 5 months ago
JavaScript Essentials
"Before JavaScript was created, a typical web browsing experience consisted largely of displaying static pages of information. Any type of user interaction with a web page usu...
techotopia.com
EUROPKI
2004
Springer
15 years 3 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...