Results 51 to 60 of about 1,281,108 (372)
A Frictionless and Secure User Authentication in Web-Based Premium Applications
By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily.
Rashidah F. Olanrewaju+4 more
doaj +1 more source
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
I. Riadi, R. Umar, W. Sukarno
semanticscholar +1 more source
Toward discovering and exploiting private server-side Web API
Most of the interfaces for mobile application and server interaction use the Web API for communication,but the Web API introduced by these mobile applications may introduce new security issues.To facilitate the study of the security of Web API,a system ...
Jia CHEN, Shan-qing GUO
doaj +3 more sources
A Secure Framework for Communication and Data Processing in Web Applications
Web applications are widely used, and the applications deployed on the web do not always satisfy all the security policies. This may arise due to less secure configurations, less knowledge in security configurations, or due to insecure coding practices ...
Suprakash Sudarsanan Nair+1 more
doaj +1 more source
Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir+8 more
wiley +1 more source
Web Application Security Tools Analysis
Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Dealing with web application or website security issues requires deep insight and planning,
Abdulrahman Alzahrani+4 more
semanticscholar +1 more source
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, D. Leon
semanticscholar +1 more source
Escrow: A large-scale web vulnerability assessment tool [PDF]
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core +2 more sources
This review covers the recent advances in the synthesis and properties of stable radical polymers (SRPs) and presents their applications in electronics, magnetics, optoelectronics, and biomedicines. The review concludes with a discussion of the challenges in radical chemistry and functionalization, while shedding light on the groundbreaking potential ...
Yufeng Xiong+11 more
wiley +1 more source
A Security Architecture for Web 2.0 Applications
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper we describe a security architecture for Web 2.0 applications that supports the flexible integration of a variety of advanced technologies for such secure execution of ...
Desmet, Lieven+7 more
openaire +4 more sources