Sciweavers

1748 search results - page 182 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
117
Voted
CCS
2009
ACM
15 years 9 months ago
Can they hear me now?: a security analysis of law enforcement wiretaps
Although modern communications services are susceptible to third-party eavesdropping via a wide range of possible techniques, law enforcement agencies in the US and other countrie...
Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark...
103
Voted
WETICE
1998
IEEE
15 years 7 months ago
A Component Approach to Embedding Awareness and Conversation
Most approaches to real-time collaboration and awareness involve the use of special applications to connect users to each other either peer-to-peer or via a central server. At Lot...
David Mitchell
112
Voted
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 8 months ago
Electronic Voting: Algorithmic and Implementation Issues
Electronic Transactions over the Internet, particularly using the World Wide Web have become an integral part of economic life. Recently also the public sector has started to use ...
Robert Kofler, Robert Krimmer, Alexander Prosser
117
Voted
CCE
2006
15 years 2 months ago
An efficient algorithm for large scale stochastic nonlinear programming problems
The class of stochastic nonlinear programming (SNLP) problems is important in optimization due to the presence of nonlinearity and uncertainty in many applications, including thos...
Y. Shastri, Urmila M. Diwekar
135
Voted
ACSAC
2004
IEEE
15 years 6 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...