Results 1 to 10 of about 629,332 (223)
New XML Signature Scheme That is Resistant to Some Attacks [PDF]
Supporting the execution of transactions through the use of electronic documents requires security. The scope of this security primarily involves ensuring the integrity, authenticity and non-repudiation of the origin of information.
Gerard Wawrzyniak, Imed El Fray
doaj +4 more sources
Spatial Signature Method (SSM) Against XML Signature Wrapping Attacks [PDF]
Living in cyber world with revolutionizes of Industrial 4.0, most of the users and organisations prefer to sell and buy products or services via website online transaction.
Madihah Mohd Saudi +3 more
doaj +3 more sources
XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany [PDF]
XML Signature Wrapping (XSW) has been a relevant threat to web services for 15 years until today. Using the Personal Health Record (PHR), which is currently under development in Germany, we investigate a current SOAP-based web services system as a case ...
Paul Höller +2 more
semanticscholar +5 more sources
Development of information technologies is often misused by an organization or a person to take criminal acts, such as the ability to steal and modify information in the data distribution for evil criminal purpose.
Slamet Widodo +2 more
openalex +2 more sources
Sanitizable Signatures in XML Signature — Performance, Mixing Properties, and Revisiting the Property of Transparency [PDF]
Henrich C. Pöhls +2 more
openalex +2 more sources
A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature
Srinath K. S +3 more
openalex +2 more sources
XML Encryption and Signature for Securing Web Services
Iehab ALRassan
semanticscholar +4 more sources
Secure Combination of XML Signature Application with Message Aggregation in Multicast Settings
Andreas Becker, Meiko Jensen
openalex +3 more sources
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources

