Results 61 to 70 of about 31,169 (91)
Some of the next articles are maybe not open access.

Related searches:

The Minimum Upload Cost of Symmetric Private Information Retrieval

International Symposium on Information Theory, 2020
For the symmetric private information retrieval problem with K messages and N servers, we show that the minimum (symmetric) upload cost is ${\log _2}\left( {\left\lceil {{K^{\frac{1}{{N - 1}}}}} \right\rceil } \right)$ bits per server, i.e., the user ...
Yanliang Zhou   +3 more
semanticscholar   +1 more source

UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities

Dependable Systems and Networks, 2019
Unrestricted file upload vulnerabilities enable attackers to upload and execute malicious scripts in web servers. We have built a system, namely UChecker, to effectively and automatically detect such vulnerabilities in PHP server-side web applications ...
Jin Huang, Yu Li, Junjie Zhang, Rui Dai
semanticscholar   +1 more source

URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing

IEEE Transactions on Information Forensics and Security
Unrestricted file upload (UFU) vulnerabilities, especially unrestricted executable file upload (UEFU) vulnerabilities, pose severe security risks to web servers.
Yuanchao Chen   +5 more
semanticscholar   +1 more source

Decision making support for privacy data upload in smart home

UbiComp/ISWC Adjunct, 2019
A smart home equipped with various smart devices allows a service provider to automatically identify daily living activities from sensor/appliance data, but it is risky for dwellers to upload all the data generated in the home. In this paper, we define a
Sopicha Stirapongsasuti   +2 more
semanticscholar   +1 more source

Understanding On-device Bufferbloat for Cellular Upload

ACM/SIGCOMM Internet Measurement Conference, 2016
Despite the extensive characterization of the growth of cellular network traffic, we observe two important trends not yet thoroughly investigated. First, fueled by the LTE technology and applications involving wearable devices and device-to-device (D2D ...
Y. Guo   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy