Sciweavers

14824 search results - page 2786 / 2965
» Security - Introduction
Sort
View
151
Voted
ESSOS
2011
Springer
14 years 6 months ago
SessionShield: Lightweight Protection against Session Hijacking
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...
161
Voted
FSE
2011
Springer
263views Cryptology» more  FSE 2011»
14 years 6 months ago
Practical Near-Collisions on the Compression Function of BMW
Abstract. Blue Midnight Wish (BMW) is one of the fastest SHA-3 candidates in the second round of the competition. In this paper we study the compression function of BMW and we obta...
Gaëtan Leurent, Søren S. Thomsen
193
Voted
ICCSA
2011
Springer
14 years 6 months ago
Integration of ePortfolios in Learning Management Systems
The LMS plays a decisive role in most eLearning environments. Although they integrate many useful tools for managing eLearning activities, they must also be effectively integrated ...
Ricardo Queirós, Lino Oliveira, José...
109
Voted
IEEESP
2011
14 years 6 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
138
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
A highly scalable bandwidth estimation of commercial hotspot access points
—WiFi access points that provide Internet access to users have been steadily increasing in urban areas. Different access points differ from one another in terms of services that ...
Xinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Li...
« Prev « First page 2786 / 2965 Last » Next »