Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of ...
1 The paper proposes a new test model, Call-For-Testing (CFT), and applies it to User Acceptance Testing (UAT) of Web Applications. Different from traditional approaches, UAT in th...
Lian Yu, Wei Zhao, Xiaofeng Di, Changzhu Kong, Wen...
As the time of mobile Internet has come gently, the mobile applications has progressively designed by techniques based on web technology. The web technology has a lot of strong po...