Using unauthorized access to information based on applets | IEEE Conference Publication | IEEE Xplore