Results 31 to 40 of about 155,949 (336)

A Survey on Security of Web Services and its Implementations [PDF]

open access: yesEAI Endorsed Transactions on Cloud Systems, 2017
Web Services are software snippets that can be integrated in HTTP and XML based messages based on web technology. Security plays a crucial role in web services.
Shridevi S., Deepti Gautam
doaj   +1 more source

Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
for Dilithium, the post-quantum signature scheme recently standardized by NIST. We improve the masked generation of the masking vector y, based on a fast Booleanto- arithmetic conversion modulo q.
Jean-Sébastien Coron   +4 more
doaj   +1 more source

HTTPI Based Web Service Security over SOAP [PDF]

open access: yesChoudhary, P., Aaseri, R., Roberts, N., (2013) "HTTPI Based Web Service Security over SOAP", IJNSA, Vol.5, No.3, on pp. 55-66, 2013
Now a days, a new family of web applications open applications, are emerging (e.g., Social Networking, News and Blogging). Generally, these open applications are non-confidential. The security needs of these applications are only client/server authentication and data integrity. For securing these open applications, effectively and efficiently, HTTPI, a
arxiv   +1 more source

Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm [PDF]

open access: yesInternational Journal of Web Research
One of the most difficult problems in web research is security. Cryptography is the fundamental technique utilized in secure communication. One key element of cryptography is Public-Key Cryptography (PKC).
Abdalhossein Rezai
doaj   +1 more source

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

Research on the SQL injection filtering based on SQL syntax tree

open access: yes网络与信息安全学报, 2016
The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL
Chen-wang HAN,Hui LIN,Chuan HUANG
doaj   +1 more source

Crime Against History: Slavery, Race, and the 1776 Report

open access: yesNew Directions for Adult and Continuing Education, EarlyView.
ABSTRACT With the 2025 executive order, “Ending Radical Indoctrination in K‐12 Schooling,” the Trump administration reestablished the 1776 Commission, which produced The 1776 Report. This article argues that this report, which is an unsubtle response to The 1619 Project, reveals how White Christian Nationalists wish to mandate that a hyper‐patriotic ...
William V. Trollinger
wiley   +1 more source

Machine Learning-Driven Detection of Cross-Site Scripting Attacks

open access: yesInformation
The ever-growing web application landscape, fueled by technological advancements, introduces new vulnerabilities to cyberattacks. Cross-site scripting (XSS) attacks pose a significant threat, exploiting the difficulty of distinguishing between benign and
Rahmah Alhamyani, Majid Alshammari
doaj   +1 more source

I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild

open access: yesIEEE Access, 2018
As the usage of the Web increases, so do the threats an everyday user faces. One of the most pervasive threats a Web user faces is tracking, which enables an entity to gain unauthorized access to the user's personal data.
Stefano Belloro, Alexios Mylonas
doaj   +1 more source

Evaluation of the use of web technology by government of Sri Lanka to ensure food security for its citizens [PDF]

open access: yesProcedia Food Science,Volume 6, 2016, Pages 82_91, International Conference of Sabaragamuwa University of Sri Lanka 2015 (ICSUSL 2015), 2016
Web technology is one of the key areas in information and communication technology to be used as a powerful tool in ensuring food security which is one of the main issues in Sri Lanka. Web technology involves in communicating and sharing resources in network of computers all over the world.
arxiv   +1 more source

Home - About - Disclaimer - Privacy