Ic

Results: 14218



#Item
31Computing / Software / World Wide Web / Hacking / Ajax / Internet privacy / Computer network security / Web browsers / Content Security Policy / HTTP cookie / Cross-origin resource sharing / Cross-site request forgery

PDF Document

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-03 03:04:53
32Cryptography / Computing / Secure communication / Cryptographic software / Cryptographic protocols / Transport Layer Security / Internet Standards / HTTPS / Password / Public-key cryptography / Client-side / Key

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2013-01-25 08:24:32
33Ambient calculus / Process calculi

On Abstra t Interpretation of Mobile Ambients  Fran es a Levi DISI, University of Genova, Italy Sergio Ma eis Department of Computing, Imperial College, UK levifrandisi.unige.it

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
34Software engineering / Computing / Computer programming / Procedural programming languages / Programming languages / Logic in computer science / Programming language semantics / Abstract interpretation / Operational semantics / ALGOL 68 / Syntax / Programming language

NSADAbstract Domains for Type Juggling Vincenzo Arceri1 Department of Computer Science, University of Verona, Italy

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2017-07-06 06:07:28
35Process calculi / Theoretical computer science / -calculus / Expected value / Mathematics / Creativity / Abstraction

Code-Carrying Authorization Sergio Maffeis2,3 , Mart´ın Abadi1,2 , C´edric Fournet1 , and Andrew D. Gordon1 1 2

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
36Computer network security / Cyberwarfare / Computing / Computer security / Web applications / Software testing / OWASP / Application security / Web application security / Automated threat / Vulnerability / Denial-of-service attack

............................................................... .............................................................. ............................................................... .............................

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2018-03-09 06:39:52
37

Hiding in the Crowd: an Analysis of the E�ectiveness of Browser Fingerprinting at Large Scale Alejandro Gómez-Boix Univ Rennes, Inria, CNRS, IRISA Rennes, France

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2018-03-06 09:06:09
    38Software engineering / Computing / Computer programming / Data types / Cross-platform software / Object-oriented programming languages / Programming languages / Scripting languages / PHP / Array data type / Foreach loop / Iterator

    An executable formal semantics of PHP Daniele Filaretti and Sergio Maffeis Department of Computing, Imperial College London {d.filaretti11,sergio.maffeis}@imperial.ac.uk tifact

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2014-05-13 05:07:09
    39Cybercrime / Cyberwarfare / Software / Blackhole exploit kit / Exploit kit / Transport Layer Security / MPack / Malware / Exploit / CRIME

    EVOLUTION OF EXPLOIT KITS Exploring Past Trends and Current Improvements Joseph C. Chen

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-01-29 03:59:56
    40

    A Trusted Mechanised JavaScript Specification Martin Bodin Arthur Charguéraud Daniele Filaretti

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2013-11-19 11:15:29
      UPDATE