Results 51 to 60 of about 1,281,108 (372)

A Frictionless and Secure User Authentication in Web-Based Premium Applications

open access: yesIEEE Access, 2021
By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily.
Rashidah F. Olanrewaju   +4 more
doaj   +1 more source

Vulnerability of injection attacks against the application security of framework based websites open web access security project (OWASP)

open access: yesJurnal Informatika, 2018
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
I. Riadi, R. Umar, W. Sukarno
semanticscholar   +1 more source

Toward discovering and exploiting private server-side Web API

open access: yes网络与信息安全学报, 2016
Most of the interfaces for mobile application and server interaction use the Web API for communication,but the Web API introduced by these mobile applications may introduce new security issues.To facilitate the study of the security of Web API,a system ...
Jia CHEN, Shan-qing GUO
doaj   +3 more sources

A Secure Framework for Communication and Data Processing in Web Applications

open access: yesEngineering Proceedings, 2023
Web applications are widely used, and the applications deployed on the web do not always satisfy all the security policies. This may arise due to less secure configurations, less knowledge in security configurations, or due to insecure coding practices ...
Suprakash Sudarsanan Nair   +1 more
doaj   +1 more source

Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir   +8 more
wiley   +1 more source

Web Application Security Tools Analysis

open access: yes2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), 2017
Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Dealing with web application or website security issues requires deep insight and planning,
Abdulrahman Alzahrani   +4 more
semanticscholar   +1 more source

A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners

open access: yesIEEE Access, 2022
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, D. Leon
semanticscholar   +1 more source

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

Stable Radical Polymers as New Electroactive Materials: Synthesis, Properties, and Emerging Applications

open access: yesAdvanced Functional Materials, EarlyView.
This review covers the recent advances in the synthesis and properties of stable radical polymers (SRPs) and presents their applications in electronics, magnetics, optoelectronics, and biomedicines. The review concludes with a discussion of the challenges in radical chemistry and functionalization, while shedding light on the groundbreaking potential ...
Yufeng Xiong   +11 more
wiley   +1 more source

A Security Architecture for Web 2.0 Applications

open access: yes, 2009
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper we describe a security architecture for Web 2.0 applications that supports the flexible integration of a variety of advanced technologies for such secure execution of ...
Desmet, Lieven   +7 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy