Sciweavers

1943 search results - page 290 / 389
» Web application security engineering
Sort
View
121
Voted
SIGSOFT
2000
ACM
15 years 8 months ago
Bugs in the programs
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing has many advantages in terms of simplicity and effectiveness over more complex, expensi...
Richard D. Pethia
CSE
2009
IEEE
15 years 10 months ago
Social Interaction History: A Framework for Supporting Exploration of Social Information Spaces
— Social interaction history refers to traces of social interaction in information spaces. These traces have potential to help users explore and navigate through information spac...
Indratmo, Julita Vassileva
CCS
2007
ACM
15 years 10 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
157
Voted
ISI
2004
Springer
15 years 9 months ago
Generating Concept Hierarchies from Text for Intelligence Analysis
It is important to automatically extract key information from sensitive text documents for intelligence analysis. Text documents are usually unstructured and information extraction...
Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, L...
LISA
2001
15 years 5 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett