Results 31 to 40 of about 1,157,333 (342)
Some Potential Issues with the Security of HTML5 IndexedDB [PDF]
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy +2 more
core +1 more source
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium
for Dilithium, the post-quantum signature scheme recently standardized by NIST. We improve the masked generation of the masking vector y, based on a fast Booleanto- arithmetic conversion modulo q.
Jean-Sébastien Coron +4 more
doaj +1 more source
Security analysis of a web system is complicated, and thus analysis using formal methods to describe system specification mathematically has attracted attention.
Hayato Shimamoto +5 more
doaj +1 more source
Assessing the impact of affective feedback on end-user security awareness [PDF]
A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users ...
Archibald, Jacqueline +2 more
core +2 more sources
Web services are self-contained modular applications that provide a computation upon request. These services can be described, published, located, and invoked over a network, generally over the Internet. However, intranets, extranets, and LANs can also be used. as well.
openaire +2 more sources
Security Issues in a SOA-based Provenance System [PDF]
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments).
H.C. Wong +9 more
core +2 more sources
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer +7 more
core +1 more source
An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System [PDF]
The web constitutes a complex infrastructure and as demonstrated by numerous attacks, rigorous analysis of standards and web applications is indispensable. Inspired by successful prior work, in particular the work by Akhawe et al.
Fett, Daniel +2 more
core +2 more sources
Security and computer forensics in web engineering education [PDF]
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman +8 more
wiley +1 more source

