Login / Signup
XML signature element wrapping attacks and countermeasures.
Michael McIntosh
Paula Austel
Published in:
SWS (2005)
Keyphrases
</>
countermeasures
xml documents
information security
xml elements
xml data
power analysis
java card
metadata
xml schema
databases
cyber attacks
relational databases
object oriented
data model
xml retrieval
information systems
security measures
security breaches
signature scheme
database