PayWord and MicroMint: Two Simple Micropayment Schemes
Proceedings of the International Workshop on Security Protocols
Designing Electronic Forms in Web Applications: Integration of Form Components
MDM '01 Proceedings of the Second International Conference on Mobile Data Management
Exploring the bounds of web latency reduction from caching and prefetching
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Automatic Integrity Checks for Remote Web Resources
IEEE Internet Computing
IMSA'07 IASTED European Conference on Proceedings of the IASTED European Conference: internet and multimedia systems and applications
EurolMSA '07 Proceedings of the Third IASTED European Conference on Internet and Multimedia Systems and Applications
A semantic data validation service for web applications
Journal of Theoretical and Applied Electronic Commerce Research
A Framework for Large-Scale Detection of Web Site Defacements
ACM Transactions on Internet Technology (TOIT)
Scalable integrity-guaranteed AJAX
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
Hi-index | 48.22 |
Malicious attacks on Web servers by intruders and hackers are prime concerns of organizations, administrators of Web sites, as well as users who access them.