Results 31 to 40 of about 155,949 (336)
A Survey on Security of Web Services and its Implementations [PDF]
Web Services are software snippets that can be integrated in HTTP and XML based messages based on web technology. Security plays a crucial role in web services.
Shridevi S., Deepti Gautam
doaj +1 more source
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium
for Dilithium, the post-quantum signature scheme recently standardized by NIST. We improve the masked generation of the masking vector y, based on a fast Booleanto- arithmetic conversion modulo q.
Jean-Sébastien Coron+4 more
doaj +1 more source
HTTPI Based Web Service Security over SOAP [PDF]
Now a days, a new family of web applications open applications, are emerging (e.g., Social Networking, News and Blogging). Generally, these open applications are non-confidential. The security needs of these applications are only client/server authentication and data integrity. For securing these open applications, effectively and efficiently, HTTPI, a
arxiv +1 more source
Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm [PDF]
One of the most difficult problems in web research is security. Cryptography is the fundamental technique utilized in secure communication. One key element of cryptography is Public-Key Cryptography (PKC).
Abdalhossein Rezai
doaj +1 more source
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi+2 more
wiley +1 more source
Research on the SQL injection filtering based on SQL syntax tree
The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL
Chen-wang HAN,Hui LIN,Chuan HUANG
doaj +1 more source
Crime Against History: Slavery, Race, and the 1776 Report
ABSTRACT With the 2025 executive order, “Ending Radical Indoctrination in K‐12 Schooling,” the Trump administration reestablished the 1776 Commission, which produced The 1776 Report. This article argues that this report, which is an unsubtle response to The 1619 Project, reveals how White Christian Nationalists wish to mandate that a hyper‐patriotic ...
William V. Trollinger
wiley +1 more source
Machine Learning-Driven Detection of Cross-Site Scripting Attacks
The ever-growing web application landscape, fueled by technological advancements, introduces new vulnerabilities to cyberattacks. Cross-site scripting (XSS) attacks pose a significant threat, exploiting the difficulty of distinguishing between benign and
Rahmah Alhamyani, Majid Alshammari
doaj +1 more source
I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild
As the usage of the Web increases, so do the threats an everyday user faces. One of the most pervasive threats a Web user faces is tracking, which enables an entity to gain unauthorized access to the user's personal data.
Stefano Belloro, Alexios Mylonas
doaj +1 more source
Evaluation of the use of web technology by government of Sri Lanka to ensure food security for its citizens [PDF]
Web technology is one of the key areas in information and communication technology to be used as a powerful tool in ensuring food security which is one of the main issues in Sri Lanka. Web technology involves in communicating and sharing resources in network of computers all over the world.
arxiv +1 more source