Sciweavers

3056 search results - page 112 / 612
» Open Implementation Analysis and Design
Sort
View
138
Voted
CCS
2011
ACM
14 years 3 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
114
Voted
WWW
2007
ACM
16 years 4 months ago
Utility analysis for topically biased PageRank
PageRank is known to be an efficient metric for computing general document importance in the Web. While commonly used as a one-size-fits-all measure, the ability to produce topica...
Christian Kohlschütter, Paul-Alexandru Chirit...
127
Voted
INDOCRYPT
2003
Springer
15 years 9 months ago
Security Analysis of Several Group Signature Schemes
At Eurocrypt’91, Chaum and van Heyst introduced the concept of group signature. In such a scheme, each group member is allowed to sign messages on behalf of a group anonymously. ...
Guilin Wang
142
Voted
DATE
2010
IEEE
171views Hardware» more  DATE 2010»
15 years 8 months ago
Statistical static timing analysis using Markov chain Monte Carlo
—We present a new technique for statistical static timing analysis (SSTA) based on Markov chain Monte Carlo (MCMC), that allows fast and accurate estimation of the right-hand tai...
Yashodhan Kanoria, Subhasish Mitra, Andrea Montana...
170
Voted
CSFW
2012
IEEE
13 years 6 months ago
Discovering Concrete Attacks on Website Authorization by Formal Analysis
—Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social ...
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffe...