Sciweavers

1943 search results - page 96 / 389
» Web application security engineering
Sort
View
DRM
2007
Springer
15 years 4 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
HT
2007
ACM
15 years 1 months ago
Lesson learnt from a large-scale industrial semantic web application
The design and maintenance of an aero-engine generates a significant amount of documentation. When designing new engines, engineers must obtain knowledge gained from maintenance o...
Sylvia C. Wong, Richard M. Crowder, Gary B. Wills,...
QSIC
2007
IEEE
15 years 4 months ago
Learning Effective Oracle Comparator Combinations for Web Applications
Web application testers need automated, effective approaches to validate the test results of complex, evolving web applications. In previous work, we developed a suite of automate...
Sara Sprenkle, Emily Hill, Lori L. Pollock
COMPSAC
2004
IEEE
15 years 1 months ago
Web Application Bypass Testing
Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and...
Jeff Offutt, Ye Wu, Xiaochen Du, Hong Huang
JUCS
2008
115views more  JUCS 2008»
14 years 10 months ago
Supporting the Development of Accessible Web Applications
: The aim of this paper is to review the best known methodologies for web applications development as well as the existing supporting tools and techniques from an accessibility-cen...
Myriam Arrue, Markel Vigo, Julio Abascal