Results 1 to 10 of about 877 (167)
Encryption & Hiding Information in Internet Files HTML & XML [PDF]
In order to achieve communication security, cryptography and information hiding in different media are used. In this work, a system for hiding text in Internet files namely, HTML and XML has been built.
Dujan Taha, Ahmed Nori, Najla Ibraheem
doaj +3 more sources
Design and Implementation of Special Chemical Management System Based on XML Encryption Principle
A reasonable and effective special chemical management system can not only facilitate the application and use of chemicals by enterprises, but also facilitate the supervision of regulatory departments, and it can prevent special chemicals from flowing ...
Xin Yu
doaj +2 more sources
Securing Web Services Using XML Signature and XML Encryption [PDF]
6 pages, 8 figures, 1 ...
Saravanaguru, RA. K. +3 more
openaire +3 more sources
XML Encryption and Signature for Securing Web Services
In this research, we have focused on the most challenging issue that Web Services face, i.e. how to secure their information. Web Services security could be guaranteed by employing security standards, which is the main focus of this search. Every suggested model related to security design should put in the account the securities' objectives; integrity,
Iehab ALRassan
+5 more sources
Implementasi XML Encryption (XML Enc) Menggunakan Java
Seiring dengan semakin luasnya penggunaan XML pada berbagai layanan di internet, yang penyebaran informasinya sebagian besar menggunakan infrastruktur jaringan umum, maka mulai muncul permasalahan mengenai kebutuhan akan keamanan data bagi informasi yang terkandung didalam sebuah dokumen XML.
Tenia Wahyuningrum
openaire +4 more sources
XML Base Secured Data Encryption and Transmission Technology
With the development of data transmission and Web Service technology, XML is widely used in all kinds of information transformation. So, Security in XML data transmission is very important, nowadays, in most of the sensitive issue like Bank transaction, online transaction, e-commerce, Diplomatic data etc. For secure XML Transaction, several methods are
openaire +2 more sources
XML ENCRYPTION AND XML SIGNATURE FOR WEB SERVICE SECURITY
openaire +2 more sources
A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature
Vijay Kumar F G +3 more
openaire +2 more sources
Conformance Testing Tool Implementation for XML Encryption Products
Han-Na Chae, Gwang-Soo Rhee
openaire +3 more sources
Adeno‐associated virus serotype 2 capsid variants for improved liver‐directed gene therapy
Abstract Background and Aims Current liver‐directed gene therapies look for adeno‐associated virus (AAV) vectors with improved efficacy. With this background, capsid engineering is explored. Whereas shuffled capsid library screenings have resulted in potent liver targeting variants with one first vector in human clinical trials, modifying natural ...
Nadja Meumann +25 more
wiley +1 more source

