Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
Abstract. This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) c...
CoralCDN is a self-organizing web content distribution network (CDN). Publishing through CoralCDN is as simple as making a small change to a URL's hostname; a decentralized D...
On-Demand Computing fulfills the need of computing availability at limited hardware and software costs. Distributed systems of this kind typically store user files in a shared ...
Fabio Dellutri, Salvatore Di Blasi, Giuseppe F. It...