Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
PST & JEST GUIDE BY Hamim
    • by 
    •   12  
      TestingStsMCQClowns, Fools, and Jesters
The development of web applications is typically done oblivious to privacy precautions. Largely, this is due to lack of technical knowledge and appropriate tools for enforc- ing privacy. As a result, web... more
    • by 
    •   8  
      UsabilityPrivacyWeb Application SecuritySql Injection
This paper describes the design, implementation, analy- sis, and evaluation of a Practical Buses protocol for anony- mous network communication. The protocol, based on the metaphor of a city bus, provides connection anonymity for... more
    • by 
    •   2  
      Internet Routing Protocolpst
Nowadays, the shift towards e-commerce is an inevitable trend. Digital signatures [1] are designed in e-commerce to fulfill the functions of traditional signatures for authentication, data integrity, and non repudiation purposes.... more
    • by 
    •   5  
      Digital SignaturePublic Key InfrastructureSmart CardE Commerce
This paper describes the design, implementation, analy- sis, and evaluation of a Practical Buses protocol for anony- mous network communication. The protocol, based on the metaphor of a city bus, provides connection anonymity for... more
    • by 
    •   2  
      Internet Routing Protocolpst
This proposal develops the concept of combining a handwritten signature, digital signature, and a smart card into an overall Public Key Infrastructure (PKI). The purpose of this proposed solution is to fulfill the cultural gap between... more
    • by 
    •   6  
      Computer ScienceDigital SignaturePublic Key InfrastructureSmart Card
This proposal develops the concept of combining a handwritten signature, digital signature, and a smart card into an overall Public Key Infrastructure (PKI). The purpose of this proposed solution is to fulfill the cultural gap between... more
    • by 
    •   6  
      Computer ScienceDigital SignaturePublic Key InfrastructureSmart Card
    • by 
    •   5  
      Information disclosureUser profileRecommender SystemEmpirical Research
    • by 
    •   4  
      Java ProgrammingSecurity AnalysisMobile Devicepst