-
1
-
-
0001853125
-
The computer for the twenty-first century
-
Weiser M. The computer for the twenty-first century. Scientific American (1991) 94-100
-
(1991)
Scientific American
, pp. 94-100
-
-
Weiser, M.1
-
2
-
-
33749657070
-
-
J. Ditlev, Rest in peace, in: RFID Buzz. http://www.rfidbuzz.com/news/2005/rest_in_peace.html
-
-
-
-
3
-
-
33749670937
-
-
International Civil Aviation Organization, Biometrics deployment of machine readable travel documents, 2004. http://www.icao.int/mrtd/download/documents/Biometrics%20deployment%20of%20Machine%20Readable%20Travel%20Documents%202004.pdf
-
-
-
-
4
-
-
84877887414
-
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, M. Szydlo, Security analysis of a cryptographically-enabled RFID device, in: 14th USENIX Security Symposium, USENIX, Baltimore, Maryland, USA, 2005, pp. 1-16
-
-
-
-
5
-
-
33847269759
-
-
Z. Kfir, A. Wool, Picking virtual pockets using relay attacks on contactless smartcard systems, in: 1st Intl. Conf. on Security and Privacy for Emerging Areas in Communication Networks, 2005
-
-
-
-
6
-
-
0021122553
-
Software errors and complexity: An empirical investigation
-
Basili V.R., and Perricone B.T. Software errors and complexity: An empirical investigation. Communications of the ACM 27 1 (1984) 42-52
-
(1984)
Communications of the ACM
, vol.27
, Issue.1
, pp. 42-52
-
-
Basili, V.R.1
Perricone, B.T.2
-
7
-
-
12244311689
-
-
N. Weaver, V. Paxson, S. Staniford, R. Cunningham, A taxonomy of computer worms, in: First Workshop on Rapid Malcode, WORM, 2003
-
-
-
-
8
-
-
33749670932
-
-
C. Anley, Advanced SQL injection in SQL Server applications. http://www.nextgenss.com/papers/advanced_sql_injection.pdf
-
-
-
-
9
-
-
33749670933
-
-
Microsoft Corporation, How to prevent cross-site scripting security issues. http://support.microsoft.com/default.aspx?scid=kb;en-us;Q252985
-
-
-
-
10
-
-
33749657069
-
-
US-CERT, Vulnerability Note VU#181038 - Microsoft Windows Metafile handler SETABORTPROC GDI Escape Vulnerability
-
-
-
-
11
-
-
33749657068
-
-
K. Sitaker, How to find security holes. http://www.canonical.org/~kragen/security-holes.html
-
-
-
-
13
-
-
33749657072
-
-
D.R. Hofstadter, Godel, Escher, Bach: An Eternal Golden Braid, Basic Books, Inc., New York, NY, USA, 1979
-
-
-
-
14
-
-
33749657071
-
-
N. Jorgensen, Self documenting program in SQL. http://www.droptable. com/archive478-2005-5-25456.html
-
-
-
-
15
-
-
33749670935
-
-
D. Madore, Quines (self-replicating programs). http://www.madore.org/~david/computers/quine.html
-
-
-
-
16
-
-
33749670936
-
-
D. Rajesh, Advanced concepts to prevent SQL injection. http://www.csharpcorner.com/UploadFile/rajeshdg/Page107142005052957AM/Page1.aspx?ArticleID=631d8221-64ed-4db7-b81b-8ba3082cb496
-
-
-
-
17
-
-
16244366310
-
-
N. Nethercote, J. Seward, Valgrind: A program supervision framework, Electronic Notes in Theoretical Computer Science 89 (2)
-
-
-
-
18
-
-
33749663876
-
-
B. Perens, Electric fence. http://perens.com/FreeSoftware/ElectricFence/
-
-
-
|