Sciweavers

6844 search results - page 1097 / 1369
» Web Service Security
Sort
View
ISI
2004
Springer
15 years 10 months ago
Generating Concept Hierarchies from Text for Intelligence Analysis
It is important to automatically extract key information from sensitive text documents for intelligence analysis. Text documents are usually unstructured and information extraction...
Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, L...
ESSOS
2010
Springer
15 years 9 months ago
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks
Web browsers that support a safe language such as Javascript are becoming a platform of great interest for security attacks. One such attack is a heap-spraying attack: a new kind o...
Francesco Gadaleta, Yves Younan, Wouter Joosen
CTRSA
2004
Springer
106views Cryptology» more  CTRSA 2004»
15 years 8 months ago
Improving Robustness of PGP Keyrings by Conflict Detection
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Qinglin Jiang, Douglas S. Reeves, Peng Ning
120
Voted
LISA
2001
15 years 6 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
IIWAS
2003
15 years 6 months ago
The Effect of Information Seeking Behavior on an Online Purchase Intention
This paper reports a research in progress to study the effect of information seeking behavior on an online purchase intention. There are several strategies people use to find info...
Paulus Insap Santosa
« Prev « First page 1097 / 1369 Last » Next »