Search Results - (( web application towards algorithm ) OR ( _ application security algorithm ))*
Search alternatives:
- towards algorithm »
- web application »
-
1
-
2
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
Get full text
Get full text
Get full text
Article -
3
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…The growing problem of breaches in information security in recent years has created a demand for earnest efforts towards ensuring security in electronic systems. …”
Get full text
Get full text
Get full text
Article -
4
Web page design for electronic commerce / Lee Fong Wai
Published 2003Get full text
Get full text
Thesis -
5
E-MyKad : An Online Identity Representation System for Malaysia’s Internet Community
Published 2013Get full text
Get full text
Final Year Project -
6
-
7
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad
Published 2023“…With this web application, students can make more informed decisions and take a step towards achieving their academic goals. …”
Get full text
Get full text
Get full text
Article -
9
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
10
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
11
Improving the security of LBlock lightweight algorithm using bit permutation
Published 2013Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
Get full text
Get full text
Thesis -
13
-
14
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
15
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In comparison to the standard bioinspired algorithms and existing secure routing protocols, the proposed system reduces average energy consumption by nearly 50% regardless of the increase in the number of nodes and end-to-end delay of 40%, while finding the secure and optimal path in unison is designed to ensure trust in the IoT environment.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003Get full text
Get full text
Article -
18
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper
