Journal articles on the topic 'Application security verification standard'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Application security verification standard.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hamdy, Safuat. "Der OWASP Application Security Verification Standard." Datenschutz und Datensicherheit - DuD 36, no. 11 (October 23, 2012): 797–800. http://dx.doi.org/10.1007/s11623-012-0274-4.
Full textBicaku, Ani, Markus Tauber, and Jerker Delsing. "Security standard compliance and continuous verification for Industrial Internet of Things." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772092273. http://dx.doi.org/10.1177/1550147720922731.
Full textJendrian, Kai. "Überprüfung von Webanwendungen mit dem „OWASP Application Security Verification Standard 2009“." Datenschutz und Datensicherheit - DuD 34, no. 3 (February 24, 2010): 138–42. http://dx.doi.org/10.1007/s11623-010-0022-6.
Full textGarmash, D. V., G. A. Maleeva, and S. O. Kandiy. "Draft of Rainbow electronic signature standard and its main properties and application possibilities." Radiotekhnika, no. 203 (December 23, 2020): 82–90. http://dx.doi.org/10.30837/rt.2020.4.203.07.
Full textRemlein, Piotr, and Urszula Stachowiak. "Security Verification in the Context of 5G Sensor Networks." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 107–19. http://dx.doi.org/10.26636/jtit.2021.153221.
Full textVikhe, Ms Prajakta. "Secured Application Environment using Enhanced Graphical Passwords." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1462–69. http://dx.doi.org/10.22214/ijraset.2021.35293.
Full textDewani, Amirita, Pirah Memon, Veena Kumari, Anum Arain, Ayaz Jiskani, and Sania Bhatti. "Keyless Smart Home: An application of Home Security and Automation." Oriental journal of computer science and technology 11, no. 2 (May 7, 2018): 107–14. http://dx.doi.org/10.13005/ojcst11.02.06.
Full textAdil Yazdeen, Abdulmajeed, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, and Rizgar R. Zebari. "FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review." Qubahan Academic Journal 1, no. 2 (March 15, 2021): 8–16. http://dx.doi.org/10.48161/qaj.v1n2a38.
Full textKASHTANOV, Serhii F., Yury O. POLUKAROV, Oleksiy I. POLUKAROV, Liudmyla O. MITIUK, and Nataliia F. KACHYNSKA. "Specifics of modern security requirements for software of electronic machine control systems." INCAS BULLETIN 13, S (August 3, 2021): 87–97. http://dx.doi.org/10.13111/2066-8201.2021.13.s.9.
Full textPan, Mingming, Shiming Tian, Jindou Yuan, and Songsong Chen. "Simulation of Dynamic User Network Connection Anti-Interference and Security Authentication Method Based on Ubiquitous Internet of Things." Mathematical Problems in Engineering 2021 (June 21, 2021): 1–8. http://dx.doi.org/10.1155/2021/5687208.
Full textSangeethaPriya, N., L. Bharathi, S. Dola Sanjay, N. V. D. P. Murthy, and A. N. L. Harisha. "Optimal Multilevel Link Extend Umpiring Routing Based Secure Routing Protocol for Improving Privacy Standard in Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 17, no. 12 (December 1, 2020): 5543–49. http://dx.doi.org/10.1166/jctn.2020.9451.
Full textYang, Xiao-Dong, Li-Kun Xiao, Chun-Lin Chen, and Cai-Fen Wang. "A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments." Symmetry 10, no. 11 (November 2, 2018): 580. http://dx.doi.org/10.3390/sym10110580.
Full textHakeem, Shimaa A. Abdel, and HyungWon Kim. "Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X." Sensors 21, no. 2 (January 19, 2021): 665. http://dx.doi.org/10.3390/s21020665.
Full textKim, Jiyoon, Daniel Gerbi Duguma, Sangmin Lee, Bonam Kim, JaeDeok Lim, and Ilsun You. "Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches." Mobile Information Systems 2021 (September 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/7314508.
Full textSbiaa, Fatma, Sonia Kotel, Medien Zeghid, Rached Tourki, Mohsen Machhout, and Adel Baganne. "High-Level Implementation of a Chaotic and AES Based Crypto-System." Journal of Circuits, Systems and Computers 26, no. 07 (March 17, 2017): 1750122. http://dx.doi.org/10.1142/s0218126617501225.
Full textAl-Khouri, Ali M. "Biometrics Technology and the New Economy." International Journal of Innovation in the Digital Economy 3, no. 4 (October 2012): 1–28. http://dx.doi.org/10.4018/jide.2012100101.
Full textXi, Ning, Di Lu, Cong Sun, Jianfeng Ma, and Yulong Shen. "Distributed Secure Service Composition with Declassification in Mobile Clouds." Mobile Information Systems 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/7469342.
Full textAlgarni, Abeer D., Ghada M. El Banby, Naglaa F. Soliman, Fathi E. Abd El-Samie, and Abdullah M. Iliyasu. "Efficient Implementation of Homomorphic and Fuzzy Transforms in Random-Projection Encryption Frameworks for Cancellable Face Recognition." Electronics 9, no. 6 (June 24, 2020): 1046. http://dx.doi.org/10.3390/electronics9061046.
Full textChawla, Ishaan. "Face Detection & Recognition using Tensor Flow: A Review." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 18 (November 6, 2018): 7381–88. http://dx.doi.org/10.24297/ijct.v18i0.7924.
Full textKIFOR, C. V., N. TUDOR, and LAL MOHAN BARAL. "QUALITY SYSTEM FOR PRODUCTION SOFTWARE (QSPS): AN INNOVATIVE APPROACH TO IMPROVE THE QUALITY OF PRODUCTION SOFTWARE." International Journal of Software Engineering and Knowledge Engineering 23, no. 08 (October 2013): 1061–83. http://dx.doi.org/10.1142/s0218194013500319.
Full textMahmmod, Khalid Fazaa, Mohammed Muzahem Azeez, and Zeyad Hashem Ismael. "Design an active verification mechanism for certificates revocation in OCSP for internet authentication." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 4208. http://dx.doi.org/10.11591/ijece.v10i4.pp4208-4216.
Full textФігурка, Марія Василівна. "ОСОБЛИВОСТІ ВПРОВАДЖЕННЯ МІЖНАРОДНОГО СТАНДАРТУ ISO 50001 ДЛЯ ЗАБЕЗПЕЧЕННЯ ЕКОНОМІЧНОЇ СТАБІЛЬНОСТІ ЗАКЛАДІВ ВИЩОЇ ОСВІТИ В УКРАЇНІ." Bulletin of the Kyiv National University of Technologies and Design. Series: Economic sciences 127, no. 5 (March 29, 2019): 12–22. http://dx.doi.org/10.30857/2413-0117.2018.5.1.
Full textChoi, Jusop, Junsung Cho, Hyoungshick Kim, and Sangwon Hyun. "Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things." Applied Sciences 10, no. 6 (March 13, 2020): 1962. http://dx.doi.org/10.3390/app10061962.
Full textShah, Peer Azmat, Halabi B. Hasbullah, Ibrahim A. Lawal, Abubakar Aminu Mu’azu, and Low Tang Jung. "A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/506028.
Full textSrinivasan, S., Kethineni Keerthi, Gummadi Tejaswi, and Kodali Divya Shobana. "Secure Storage of Electronic Health Records on Cloud Using Integrity Verification Auditing." Revista Gestão Inovação e Tecnologias 11, no. 2 (June 8, 2021): 2132–41. http://dx.doi.org/10.47059/revistageintec.v11i2.1835.
Full textMamyrbayev, Orken, Aizat Kydyrbekova, Keylan Alimhan, Dina Oralbekova, Bagashar Zhumazhanov, and Bulbul Nuranbayeva. "Development of security systems using DNN and i & x-vector classifiers." Eastern-European Journal of Enterprise Technologies 4, no. 9(112) (August 31, 2021): 32–45. http://dx.doi.org/10.15587/1729-4061.2021.239186.
Full textDeuber, Dominic, Matteo Maffei, Giulio Malavolta, Max Rabkin, Dominique Schröder, and Mark Simkin. "Functional Credentials." Proceedings on Privacy Enhancing Technologies 2018, no. 2 (April 1, 2018): 64–84. http://dx.doi.org/10.1515/popets-2018-0013.
Full textPaul, Shubhra Deb, and Swarup Bhunia. "SILVerIn: Systematic Integrity Verification of Printed Circuit Board Using JTAG Infrastructure." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (June 25, 2021): 1–28. http://dx.doi.org/10.1145/3460232.
Full textHussien, Hassan Mansur, Sharifah Md Yasin, Nur Izura Udzir, and Mohd Izuan Hafez Ninggal. "Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage." Sensors 21, no. 7 (April 2, 2021): 2462. http://dx.doi.org/10.3390/s21072462.
Full textSulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised." Information and Control Systems, no. 4 (August 24, 2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Full textChien, Hung-Yu. "Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication." Electronics 10, no. 7 (March 26, 2021): 789. http://dx.doi.org/10.3390/electronics10070789.
Full textZhang, Li-li, Qi Zhao, Li Wang, and Ling-yu Zhang. "Research on Urban Traffic Signal Control Systems Based on Cyber Physical Systems." Journal of Advanced Transportation 2020 (October 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8894812.
Full textMcAteer, Ian, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang, and Craig Valli. "Integration of Biometrics and Steganography: A Comprehensive Review." Technologies 7, no. 2 (April 8, 2019): 34. http://dx.doi.org/10.3390/technologies7020034.
Full textObeid, Fadi, and Philippe Dhaussy. "Formal Verification of Security Pattern Composition: Application to SCADA." Computing and Informatics 38, no. 5 (2019): 1149–80. http://dx.doi.org/10.31577/cai_2019_5_1149.
Full textLeduc, G., and F. Germeau. "Verification of security protocols using LOTOS-method and application." Computer Communications 23, no. 12 (July 2000): 1089–103. http://dx.doi.org/10.1016/s0140-3664(99)00239-x.
Full textSy, B. K. "Secure Computation for Biometric Data Security—Application to Speaker Verification." IEEE Systems Journal 3, no. 4 (December 2009): 451–60. http://dx.doi.org/10.1109/jsyst.2009.2035979.
Full textWimala, Mia, Bob Zirads, and Rindu Evelina. "Water Security in Green Campus Assessment Standard." E3S Web of Conferences 93 (2019): 02003. http://dx.doi.org/10.1051/e3sconf/20199302003.
Full textJo, Young-Hoo, Seong-Yun Jeon, Jong-Hyuk Im, and Mun-Kyu Lee. "Security Analysis and Improvement of Fingerprint Authentication for Smartphones." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/8973828.
Full textGao, Min. "Research on the Application of Spatial Logic in the Security Protocol Verification of Computer." Applied Mechanics and Materials 513-517 (February 2014): 2379–83. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2379.
Full textTAKAHASHI, Kenta, and Shinji HIRATA. "Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A, no. 1 (2011): 233–44. http://dx.doi.org/10.1587/transfun.e94.a.233.
Full textHan, KyungHyun, Trong-Kha Nguyen, Hun Joe, Seong Oun Hwang, and Chaeho Lim. "Cost-Effective and Active Security Verification Framework for Web Application Vulnerabilities." KIPS Transactions on Computer and Communication Systems 5, no. 8 (August 31, 2016): 189–96. http://dx.doi.org/10.3745/ktccs.2016.5.8.189.
Full textLi, Xiao Le, Yong Jun Luo, Yu Liang, and Ying Wen. "Design and Verification of Security Protocol for Information Transmission in Digital Campus." Advanced Materials Research 532-533 (June 2012): 1230–34. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.1230.
Full textBicaku, Ani, Christoph Schmittner, Patrick Rottmann, Markus Tauber, and Jerker Delsing. "Security Safety and Organizational Standard Compliance in Cyber Physical Systems." Infocommunications journal, no. 1 (2019): 2–9. http://dx.doi.org/10.36244/icj.2019.1.1.
Full textAhamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "A Secure Mobile Wallet Framework with Formal Verification." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 2 (April 2012): 1–15. http://dx.doi.org/10.4018/japuc.2012040101.
Full textKumari, Kamlesh, and Sanjeev Rana. "Offline Signature Verification using Intelligent Algorithm." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 69. http://dx.doi.org/10.14419/ijet.v7i4.12.20995.
Full textHur, Hwan Seok, Sung Hoon Kang, and Seung Joo Kim. "A Proposal for "Security Verification Method for Implementation of Secure Android Mobile Application"." KIPS Transactions on Computer and Communication Systems 2, no. 10 (October 31, 2013): 445–60. http://dx.doi.org/10.3745/ktccs.2013.2.10.445.
Full textLIU Junxiu, XIAO Long, LU Liuxiu, and SU Xiaowei. "Fast Information Security Verification Method and its Application in Electric Energy Management Terminal." Journal of Convergence Information Technology 7, no. 2 (February 29, 2012): 217–24. http://dx.doi.org/10.4156/jcit.vol7.issue2.26.
Full textBernardi, S., U. Gentile, S. Marrone, J. Merseguer, and R. Nardone. "Security modelling and formal verification of survivability properties: Application to cyber–physical systems." Journal of Systems and Software 171 (January 2021): 110746. http://dx.doi.org/10.1016/j.jss.2020.110746.
Full textNAGY, MARIUS, and SELIM G. AKL. "ENTANGLEMENT VERIFICATION WITH AN APPLICATION TO QUANTUM KEY DISTRIBUTION PROTOCOLS." Parallel Processing Letters 20, no. 03 (September 2010): 227–37. http://dx.doi.org/10.1142/s0129626410000181.
Full textArora, Shakti, and Surjeet Dalal. "An Optimized Cloud Architecture for Integrity Verification." Journal of Computational and Theoretical Nanoscience 16, no. 12 (December 1, 2019): 5067–72. http://dx.doi.org/10.1166/jctn.2019.8565.
Full text