Sciweavers

1943 search results - page 236 / 389
» Web application security engineering
Sort
View
103
Voted
EUROMICRO
1997
IEEE
15 years 7 months ago
A RISC Microprocessor for Contactless Smart Cards
Two years ago [3] we began to study a R.I.S.C. approachfor smart card microprocessors. We reconsider this research to answer the question of the new technology of smart cards: the...
Christian Cormier, Georges Grimonprez
123
Voted
DEBU
2002
112views more  DEBU 2002»
15 years 3 months ago
Architecture and Implementation of an XQuery-based Information Integration Platform
An increasing number of business users and software applications need to process information that is accessible via multiple diverse information systems, such as database systems,...
Yannis Papakonstantinou, Vasilis Vassalos
CCS
2008
ACM
15 years 5 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
162
Voted
WWW
2010
ACM
15 years 10 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
142
Voted
FC
2006
Springer
129views Cryptology» more  FC 2006»
15 years 7 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig