Web Journalism
-
LONG-TERM TIME-STAMPING SERVICES
Time-stamping services produce time-stamp tokens as evidence to prove that digital data existed…
-
CYBER SECURITY LOOKUPS
BUILDING BLOCKS HYPERTEXT TRANSFER PROTOCOL – TRANSPORTATIONHYPERTEXT MARKUP LANGUAGE – REPRESENTATIONCASCADING STYLE…
-
CROSS-SITE SCRIPTING PROTECTION
Web applications are becoming the dominant way to provide access to online…
-
MALICIOUS USE OF KEYS
MALICIOUS USE OF KEYS VIA CONTENT-ONLY ATTACKS FRAMESETS AND SSL If server…
-
HISTORICAL VULNERABILITIES IN STEALING KEYS
Since the private key is not password-protected, an attacker can use the…
-
KEYJACKING: THE SURPRISING INSECURITY OF CLIENT-SIDE SSL
Currently, the Web is the dominant paradigm for information services. Typically, the browser…
-
SECURE SHELL (SSH) PROTOCOLS
A variety of popular tools that allow access to remote hosts (such…
-
SECURE SSL NETWORK PROTOCOLS
The idea of secure network protocols is to create an additional layer…
-
WEB ATTACK AND INTRUSION DETECTION
Web Attack detection assumes that an attacker can obtain access to his…
-
MODERN WEB CRYPTOGRAPHY AND CIPHERTEXT
Security mechanisms in this category assume that an intruder may access the…
-
WEB SECURITY ATTACKS AND SECURITY PROPERTIES
For the following discussion, we assume that the function of a system…
-
ONLINE INSECURITY
Passwords are the most common facet of security that we have control…