Search Results - (( web application towards algorithm ) OR ( web applications security algorithm ))*
Search alternatives:
- towards algorithm »
- web applications »
- web application »
-
1
-
2
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
Get full text
Get full text
Get full text
Article -
3
Web page design for electronic commerce / Lee Fong Wai
Published 2003Get full text
Get full text
Thesis -
4
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…The growing problem of breaches in information security in recent years has created a demand for earnest efforts towards ensuring security in electronic systems. …”
Get full text
Get full text
Get full text
Article -
5
E-MyKad : An Online Identity Representation System for Malaysia’s Internet Community
Published 2013Get full text
Get full text
Final Year Project -
6
-
7
-
8
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
9
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
10
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. …”
Get full text
Get full text
Thesis -
11
-
12
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
13
An optimized attack tree model for security test case planning and generation
Published 2018“…A 100% security risk intervention of the web application was achieved with respect to preventing SQL injection attacks after applying all security recommendations from test case execution report.…”
Get full text
Get full text
Article -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
15
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis -
16
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application supports encoding and decoding images for concealing data in images. …”
Get full text
Get full text
Get full text
Article -
17
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
19
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
Get full text
Get full text
Get full text
Thesis -
20
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
Get full text
Get full text
Get full text
Thesis
