Sciweavers

800 search results - page 146 / 160
» XML access control using static analysis
Sort
View
JSAC
2008
157views more  JSAC 2008»
14 years 10 months ago
Spectrum Leasing to Cooperating Secondary Ad Hoc Networks
Abstract--The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resource ...
Osvaldo Simeone, Igor Stanojev, Stefano Savazzi, Y...
CCS
2007
ACM
15 years 4 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
SIGCOMM
2003
ACM
15 years 3 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
WWW
2009
ACM
15 years 10 months ago
What's up CAPTCHA?: a CAPTCHA based on image orientation
We present a new CAPTCHA which is based on identifying an image's upright orientation. This task requires analysis of the often complex contents of an image, a task which hum...
Rich Gossweiler, Maryam Kamvar, Shumeet Baluja
ICC
2008
IEEE
15 years 4 months ago
On the End-to-End Delay Performance of Spatially Correlated Wireless Line Networks
— The analytical end-to-end (e2e) performance of a wireless multihop network is largely unknown, because of the interconnections between several factors involved. Customarily, th...
Min Xie, Martin Haenggi, Kai-Kit Wong