Sciweavers

1101 search results - page 69 / 221
» On the Security and Vulnerability of PING
Sort
View
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
15 years 4 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
SBP
2012
Springer
13 years 5 months ago
Creating Interaction Environments: Defining a Two-Sided Market Model of the Development and Dominance of Platforms
Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
ICMCS
2007
IEEE
118views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Cascading Multimodal Verification using Face, Voice and Iris Information
In this paper we propose a novel fusion strategy which fuses information from multiple physical traits via a cascading verification process. In the proposed system users are veri...
Ping-Han Lee, Lu-Jong Chu, Yi-Ping Hung, Sheng-Wen...
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
15 years 3 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
ECIS
2004
14 years 11 months ago
Agile Security For Information Warfare: A Call For Research
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
Richard Baskerville