Search Results - (( web applications security algorithm ) OR ( _ application design algorithms ))*

Refine Results
  1. 1

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Microcontroller-based face recognition system with web-based application for car security by Arumugam P., Ker P.J., Tan J.Y., Mani D.

    Published 2023
    “…A short message service (SMS) alert system was set up using a modem router to notify car owner in case of unauthorized user access. In addition, a web-based application was designed and developed to remotely control the car security access and to trigger the car alarm. …”
    Article
  11. 11

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…The operating system frequency is set to 40 MHz. A demonstration application prototype in the form of a real-time secure e-document application has been developed to verify the functionality and validate the embedded system.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…The project is mainly a web application for the purpose of online voting. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  19. 19

    Steganography For Embedding Data In Digital Image by Sowan, Salah Ibrahem

    Published 2003
    “…This thesis discusses the issues regarding Steganography and its application to multimedia security and communication, addressing both theoretical and practical aspects, and tackling both design and attack problems. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System by Khashan, Osama Ahmed Abdelhadi

    Published 2007
    “…Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. …”
    Get full text
    Get full text
    Thesis