Sciweavers

981 search results - page 173 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
JSW
2007
90views more  JSW 2007»
15 years 1 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan
ECUMN
2004
Springer
15 years 5 months ago
UMTS-WLAN Service Integration at Core Network Level
The integration of wireless LANs (WLANs) and 3G systems performed at core network level requires very little modifications to the current 3GPP architecture and provides a large set...
Paulo Pinto, Luis Bernardo, Pedro Sobral
CCS
2010
ACM
15 years 1 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
CCGRID
2001
IEEE
15 years 5 months ago
Replica Selection in the Globus Data Grid
The Globus Data Grid architecture provides a scalable infrastructure for the management of storage resources and data that are distributed across Grid environments. These services...
Sudharshan Vazhkudai, Steven Tuecke, Ian T. Foster
ESSOS
2011
Springer
14 years 4 months ago
SessionShield: Lightweight Protection against Session Hijacking
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...