Results 31 to 40 of about 1,157,333 (342)

Some Potential Issues with the Security of HTML5 IndexedDB [PDF]

open access: yes, 2014
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy   +2 more
core   +1 more source

Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
for Dilithium, the post-quantum signature scheme recently standardized by NIST. We improve the masked generation of the masking vector y, based on a fast Booleanto- arithmetic conversion modulo q.
Jean-Sébastien Coron   +4 more
doaj   +1 more source

Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache

open access: yesIEEE Access, 2019
Security analysis of a web system is complicated, and thus analysis using formal methods to describe system specification mathematically has attracted attention.
Hayato Shimamoto   +5 more
doaj   +1 more source

Assessing the impact of affective feedback on end-user security awareness [PDF]

open access: yes, 2017
A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users ...
Archibald, Jacqueline   +2 more
core   +2 more sources

Web and Web Security

open access: yesCommunications of the Association for Information Systems, 2004
Web services are self-contained modular applications that provide a computation upon request. These services can be described, published, located, and invoked over a network, generally over the Internet. However, intranets, extranets, and LANs can also be used. as well.
openaire   +2 more sources

Security Issues in a SOA-based Provenance System [PDF]

open access: yes, 2006
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments).
H.C. Wong   +9 more
core   +2 more sources

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

open access: yes, 2017
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer   +7 more
core   +1 more source

An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System [PDF]

open access: yes, 2014
The web constitutes a complex infrastructure and as demonstrated by numerous attacks, rigorous analysis of standards and web applications is indispensable. Inspired by successful prior work, in particular the work by Akhawe et al.
Fett, Daniel   +2 more
core   +2 more sources

Security and computer forensics in web engineering education [PDF]

open access: yes, 2010
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core  

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy