cross-browser web application testing tool
FREE-DOWNLOADSR Choudhary, H Versee… – … Maintenance (ICSM), 2010 … Abstract—Web applications have gained increased popularity in the past decade due to the ubiquity of the web browser across platforms. With the rapid evolution of web technologies, the complexity of web applications has also grown, making maintenance tasks harder. In
Provable security for physical cryptography
FREE-DOWNLOAD K Pietrzak – the proceedings of WEWORC, 2009 – Abstract. The modern approach to cryptography is provable security, where one defines a meaningful formal security model and proves that schemes are secure in this model. An exception is the design of countermeasures against cryptographic side- channel attacks, which even
Non-malleable extractors and symmetric key cryptography from weak secrets
FREE-DOWNLOAD Y Dodis… – Proceedings of the 41st annual ACM symposium …, 2009 – We study the question of basing symmetric key cryptogra- phy on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the adversary has at least k bits of uncertainty about […]