To see the other types of publications on this topic, follow the link: Applications security.

Dissertations / Theses on the topic 'Applications security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Applications security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Full text
Abstract:
<p>In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.</p><p>However, an already developed, well structured and considered security approach – with proper impl
APA, Harvard, Vancouver, ISO, and other styles
2

Prabhakara, Deepak. "Web Applications Security : A security model for client-side web applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8962.

Full text
Abstract:
<p>The Web has evolved to support sophisticated web applications. These web applications are exposed to a number of attacks and vulnerabilities. The existing security model is unable to cope with these increasing attacks and there is a need for a new security model that not only provides the required security but also supports recent advances like AJAX and mashups. The attacks on client-side Web Applications can be attributed to four main reasons – 1) lack of a security context for Web Browsers to take decisions on the legitimacy of requests, 2) inadequate JavaScript security, 3) lack of a Ne
APA, Harvard, Vancouver, ISO, and other styles
3

Kalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.

Full text
Abstract:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California<br>The use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use
APA, Harvard, Vancouver, ISO, and other styles
4

Pham, Thi Van Anh. "Security of NFC applications." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-124368.

Full text
Abstract:
Near Field Communication (NFC) refers to a communication technology that enables an effortless connection and data transfers between two devices by putting them in a close proximity. Besides contactless payment and ticketing applications, which were the original key drivers of this technology, a large number of novel use cases can benefit from this rapidly developing technology, as has been illustrated in various NFC-enabled application proposals and pilot trials. Typical NFC-enabled systems combine NFC tags, NFC-enabled mobile phones, and online servers. This thesis explores the trust relatio
APA, Harvard, Vancouver, ISO, and other styles
5

Mumtaz, Majid. "Security Services for Mobile Applications." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116762.

Full text
Abstract:
In today's era of technology, information can revolve the whole world within seconds via Internet. Devices such as smartphones, tablets and smart applications running on them enable users to access information anytime and anywhere over the air network. Ubiquitous nature of smartphones stimulates the growth of applications development, especially for small scale devices. Protection and security of sensitive mobile applications and their resources against threats are new emerging challenges for mobile application developers. Even competitive enterprise application development organizations lack
APA, Harvard, Vancouver, ISO, and other styles
6

Kounelis, Ioannis. "Security System for Mobile Commerce Applications." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Håland, Christian. "An Application Security Assessment of Popular Free Android Applications." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23820.

Full text
Abstract:
The number of applications for the Android platform found on Google Play is now over 1 million and there are over 1.5 billion downloads each month . With a low cost of entry the Android platform attracts developers many of which do not have the necessary competence or experience to develop secure applications. Weassess 20 Android applications using a custom testing methodology based on the OWASP Mobile Project and look for common vulnerabilities. We decompileapplications using Dare and review the source codemanually as well as using static and dynamic analysis to look for vulnerabilities.We al
APA, Harvard, Vancouver, ISO, and other styles
8

Svartberg, Anja. "Security in Offline Web Applications." Thesis, Norges Teknisk-Naturvitenskaplige Universitet, Institutt for elektronikk og telekommunikasjon, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10003.

Full text
Abstract:
<p>Offline Web applications are increasingly popular. The possibility to have both the advantages of Web applications and traditional desktop applications is exiting. An offline Web application can be accessed from all computers, with any operating system, as well as offering to store information locally, giving the user the opportunity to use the application when the user does not have Internet access. The concept of offline Web applications is tempting, but it is important to integrate security in the process of making them. The users rely on a high level of security. In this thesis I have l
APA, Harvard, Vancouver, ISO, and other styles
9

Ge, Xiaocheng. "Agile security for Web applications." Thesis, University of York, 2007. http://etheses.whiterose.ac.uk/11071/.

Full text
Abstract:
Web-based applications (or more concisely, Web applications) are a kind of information system with a particular architecture. They have progressively evolved from Internet browser-based, read-only information repositories to Web-based distributed systems. Today, increasing numbers of businesses rely on their Web applications. At the same time, Web applications are facing many security challenges and, as a result, are exposing businesses to many risks. This thesis proposes a novel approach to building secure Web applications using agile software development methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Almazroui, Sultan. "Microwave imaging for security applications." Thesis, University of Sussex, 2015. http://sro.sussex.ac.uk/id/eprint/58499/.

Full text
Abstract:
Microwave imaging technologies have been widely researched in the biomedical field where they rely on the imaging of dielectric properties of tissues. Healthy and malignant tissue have different dielectric properties in the microwave frequency region, therefore, the dielectric properties of a human body's tissues are generally different from other contraband materials. Consequently, dielectric data analysis techniques using microwave signals can be used to distinguish between different types of materials that could be hidden in the human body, such as explosives or drugs. Other concerns raised
APA, Harvard, Vancouver, ISO, and other styles
11

Seem, Peter R. "Optical scattering for security applications." Thesis, Imperial College London, 2009. http://hdl.handle.net/10044/1/5502.

Full text
Abstract:
Laser Surface Authentication (LSA) has emerged in recent years as a potentially disruptive tracking and authentication technology. A strong need for such a solution in a variety of industries drove the implementation of the technology faster than the scientific understanding could keep up. The drive to miniaturise and simplify, the need to be robust against real-world problems like damage and misuse, and not least, intellectual curiosity, make it clear that a firmer scientific footing is important as the technology matures. Existing scattering and biometric work are reviewed, and LSA is introd
APA, Harvard, Vancouver, ISO, and other styles
12

Ur-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.

Full text
Abstract:
Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications. Bugs and vulnerabilities are the result of weak software architecture and lack of standard software development practices. Despite the fact that software companies are investing millions of dollars in the research and development of software designs security risks are still at large. In some cases software applications are found to carry vulnerabilities for many years before being identified. A recent such example is the popular Heart Bleed Bug in the Open SSL/TSL. In today’s world,
APA, Harvard, Vancouver, ISO, and other styles
13

Dashtinejad, Pejman. "Security System for Mobile Messaging Applications." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-167125.

Full text
Abstract:
Instant messaging (IM) applications are one of the most popular applications for smartphones. The IMs have the capability of sending messages or initiating voice calls via Internet which makes it almost cost free for the users to communicate with each other. Unfortunately, like any other type of applications, majority of these applications are vulnerable to malicious attacks and have privacy issues. The motivation for this thesis is the need to identifying security services of an IM application and to design a secure system for any mobile messaging application. This research proposes an E2EE (
APA, Harvard, Vancouver, ISO, and other styles
14

Haver, Torstein. "Security and Privacy in RFID Applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9325.

Full text
Abstract:
<p>Radio Frequency Identification (RFID) is a very versatile technology. It has the potential to increase the efficiency of many common applications and is thus becoming increasingly popular. The main drawback is that the general principles the technology is built on are very vulnerable to attack. The ID imbedded in every chip combined with the openness of the radio interface exposes the users to tracking. As additional sensitive information may be stored on the tags, the user may also be exposed to other security and privacy threats. This thesis investigates how easily the reading distance o
APA, Harvard, Vancouver, ISO, and other styles
15

Erdogan, Gencer. "Security Testing of Web Based Applications." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9993.

Full text
Abstract:
<p>Web applications are becoming more and more popular in means of modern information interaction, which leads to a growth of the demand of Web applications. At the same time, Web application vulnerabilities are drastically increasing. This will inevitably expose more Web application users to malicious attacks, causing them to lose valuable information or be harmed in other ways. One of the most important software security practices that is used to mitigate the increasing number of vulnerabilities is security testing. The most commonly applied security testing methodologies today are extensi
APA, Harvard, Vancouver, ISO, and other styles
16

Zhao, Weiliang, University of Western Sydney, of Science Technology and Environment College, and School of Computing and Information Technology. "Security techniques for electronic commerce applications." THESIS_CSTE_CIT_Zhao_W.xml, 2003. http://handle.uws.edu.au:8081/1959.7/127.

Full text
Abstract:
Electronic commerce and the internet provide greater opportunities for companies and individual person to be involved in commercial activities; the involved parties may not know or trust each other or may even be mutually suspicious of each other. The issue of fairness becomes more critical and must be well addressed. The aim of this thesis is to investigate security solutions with fairness for on-line transactions. A fair trading protocol with credit payment is proposed. The proof of equivalence of discrete logarithm to discrete loglogarithm is employed as the main tool to construct the proto
APA, Harvard, Vancouver, ISO, and other styles
17

Zhao, Weiliang. "Security techniques for electronic commerce applications /." View thesis View thesis, 2003. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030505.155156/index.html.

Full text
Abstract:
Thesis (M.Sc. (Hons.)) -- University of Western Sydney, 2003.<br>"A thesis submitted for the degree of Master of Science (Honours) - Computing and Information Technology at University of Western Sydney" Bibliography : leaves 109-114.
APA, Harvard, Vancouver, ISO, and other styles
18

Katsaros, Ioannis. "Advanced network security techniques and applications." Thesis, Lancaster University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yusuf, Sherif. "Custom computing for network security applications." Thesis, Imperial College London, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.413661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Xu, Xin. "Digital watermark technology in security applications." Thesis, University of Plymouth, 2008. http://hdl.handle.net/10026.1/335.

Full text
Abstract:
With the rising emphasis on security and the number of fraud related crimes around the world, authorities are looking for new technologies to tighten security of identity. Among many modern electronic technologies, digital watermarking has unique advantages to enhance the document authenticity. At the current status of the development, digital watermarking technologies are not as matured as other competing technologies to support identity authentication systems. This work presents improvements in performance of two classes of digital watermarking techniques and investigates the issue of waterm
APA, Harvard, Vancouver, ISO, and other styles
21

Wong, Wai-kit, and 王偉傑. "Security and computability in database applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Modadugu, Nagendra Gupta. "Security for real-world networked applications /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jan, Steve T. K. "Robustifying Machine Learning based Security Applications." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99862.

Full text
Abstract:
In recent years, machine learning (ML) has been explored and employed in many fields. However, there are growing concerns about the robustness of machine learning models. These concerns are further amplified in security-critical applications — attackers can manipulate the inputs (i.e., adversarial examples) to cause machine learning models to make a mistake, and it's very challenging to obtain a large amount of attackers' data. These make applying machine learning in security-critical applications difficult. In this dissertation, we present several approaches to robustifying three machine lea
APA, Harvard, Vancouver, ISO, and other styles
24

Albright, Simon. "Security applications of novel neutron sources." Thesis, University of Huddersfield, 2016. http://eprints.hud.ac.uk/id/eprint/28333/.

Full text
Abstract:
The smuggling of illicit goods poses a significant threat to the safety, security and economy of all nations. Undeclared black market goods, illegal narcotics and weapons are all threats that could ideally be prevented from crossing national borders. At present cargo interrogation is primarily performed using X-rays, which can be defeated by effective shielding and disguising of objects. Neutron interrogation offers an additional line of defence against smuggling, and there are a number of techniques available, which are discussed in this thesis. In this thesis a review of the limitations of c
APA, Harvard, Vancouver, ISO, and other styles
25

González, Calabuig Andreu. "Electronic Tongues for food and security applications." Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/643301.

Full text
Abstract:
En la present tesi doctoral s’aprofundeix en l’estudi de les llengües electròniques i el seu desenvolupament com a línia d’investigació del grup de Sensors i Biosensors de la Universitat Autònoma de Barcelona. Aquesta línea d’investigació posa el focus en l’aplicació dels coneixements del grup d’investigació en desenvolupament de sensors electroquímics per a desenvolupar matrius de sensors per al seu ús en aplicacions del tipus Llengua Electrònica en diferents camps. La llengua electrònica es considera un nou paradigma en el món dels sensors ja que millora el resultats analítics mitjanç
APA, Harvard, Vancouver, ISO, and other styles
26

Ballester, Lafuente Carlos. "Evaluating Security in Open Source Consumer Applications." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9523.

Full text
Abstract:
<p>Introduction The aim of this Master Thesis is to develop a software security guideline that will be used for evaluating methods and measuring security in open source projects with a high security implication such as healthcare applications for example, where the privacy and security is a crucial factor. Background Theory First section of thesis is focused on presenting the appropriate background theory that will be needed for a good understanding of the rest of the thesis, like vulnerabilities, common security attacks, definition of the client-server technology, risk analysis and specific
APA, Harvard, Vancouver, ISO, and other styles
27

Rafiev, Ashur. "Mixed radix design flow for security applications." Thesis, University of Newcastle Upon Tyne, 2011. http://hdl.handle.net/10443/1380.

Full text
Abstract:
The purpose of secure devices, such as smartcards, is to protect sensitive information against software and hardware attacks. Implementation of the appropriate protection techniques often implies non-standard methods that are not supported by the conventional design tools. In the recent decade the designers of secure devices have been working hard on customising the workflow. The presented research aims at collecting the up-to-date experiences in this area and create a generic approach to the secure design flow that can be used as guidance by engineers. Well-known countermeasures to hardware a
APA, Harvard, Vancouver, ISO, and other styles
28

Daher, Waseem S. (Waseem Sebastian). "POSH : a generalized CAPTCHA with security applications." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45628.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Includes bibliographical references (p. 51-53).<br>A puzzle only solvable by humans, or POSH, is a prompt or question with three important properties: it can be generated by a computer, it can be answered consistently by a human, and a human answer cannot be efficiently predicted by a computer. In fact, a POSH does not necessari
APA, Harvard, Vancouver, ISO, and other styles
29

Whitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.

Full text
Abstract:
This thesis presents two phases of research in applying visualization to network security challenges. The first phase included discovering the most useful and powerful features in existing computer security visualizations and incorporating them into the AdviseAid visualization platform, an existing software package. The incorporation of such a complete feature set required novel resolution of software engineering, human factors, and computer graphics issues. We also designed additional novel features, such as plugin interfaces, allowing for rapid prototyping and experimentation with novel v
APA, Harvard, Vancouver, ISO, and other styles
30

La, Vinh Hoa. "Security monitoring for network protocols and applications." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLL006/document.

Full text
Abstract:
La sécurité informatique, aussi connue comme la cyber-sécurité, est toujours un sujet d'actualité dans la recherche en sciences informatiques. Comme les cyber-attaques grandissent de plus en plus en volume et en sophistication, la protection des systèmes ou réseaux d'information devient une tâche difficile. Les chercheurs dans la communauté de recherche prêtent une attention constante à la sécurité, en particulier ils s'orientent vers deux directions principales: (i) - la conception des infrastructures sécurisées avec des protocoles de communication sécurisés et (ii) - surveillance / supervisi
APA, Harvard, Vancouver, ISO, and other styles
31

Lakkaraju, Harsha Vardhan. "DPA Resistant Logic Arrays for Security Applications." University of Cincinnati / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1448037460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Kaijin ZHANG. "Efficiency and security in data-driven applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case1522443817978176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Thomay, Christian. "Muon scattering tomography for nuclear security applications." Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.683733.

Full text
Abstract:
The threat of illicit trafficking of special nuclear material (SNM) has brought about an interest in detection methods capable of identifying high-Z material in a non-invasive fashion on relatively short timescales. Muon Scattering Tomography (MST) is a method by which information about the material content of a cargo container can be obtained by measuring cosmic ray muons before and after passing through the container. In this way significant quantities of SNM that are being illegally shipped at freight ports can be detected. In a real-life application, it is important for practical reasons t
APA, Harvard, Vancouver, ISO, and other styles
34

Brown, Katherine. "Smart elastomers for use in security applications." Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/7882/.

Full text
Abstract:
Smart polymers are utilised for a variety of functions. This project aimed to produce a polymer which exhibits fluorescent emission in response to tensile stimuli. Previous fluorescence studies have shown this to be theoretically possible and fluorescence spectroscopy techniques can be used to establish the existence of such responses. A wide range of elastomers (styrene butadiene rubber, polyacrylates, polyurethane acrylates and polyurethanes) have been synthesised with aliphatic polyurethane elastomers being the most promising thus far. Fluorescent labels (9-vinylanthracene, fluorescein and
APA, Harvard, Vancouver, ISO, and other styles
35

Srilatha, Rondla, and Gande Someshwar. "Security Testing for Web Applications in SDLC." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2903.

Full text
Abstract:
Context: In Web applications, the Software vulnerability can be reduced by applying security testing in all phases of the software development life cycle (SDLC). Lot of vulnerabilities might occur if the security testing is applied in the last phase of SDLC. In order to mitigate these vulnerabilities, a lot of rework is required that involves reverse engineering in the development and design phases. To overcome this situation, organizations are shifting from security testing (performed in last phase) towards security testing in the early phases of SDLC. Objectives: The main objectives of this
APA, Harvard, Vancouver, ISO, and other styles
36

West, Balthazar, and Marcus Wengelin. "Effectiveness of fuzz testing high-security applications." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208359.

Full text
Abstract:
Fuzzing is a testing methodology that is receiving increased attention in the field of software security. The methodology is interesting because almost anyone can download a fuzzer and search for bugs in large and well-tested programs or libraries. This thesis is a case study which examines the efficiency of fuzzing a library with high security requirements. It was decided that the Mbed TLS, an open source SSL library, would be fuzzed using AFL, a state of the art fuzzer. The steps required to use AFL to fuzz Mbed TLS are outlined along with the results the study yielded. The fuzzing process d
APA, Harvard, Vancouver, ISO, and other styles
37

Dahl, Andreas, and Kristofer Nylander. "Differences in security between native applications and web based applications in the field of health care." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-40397.

Full text
Abstract:
Developing native applications for different platforms with different resolutions and screen sizes is both time consuming and costly. If developers were able to develop one web based application which can be used on multiple platforms, yet retain the same level of security as a native application, they would be able to reduce both development time and costs. In this thesis we will investigate the possibilities of achieving a level of security in a web-based application that can equal that of a native application, as well as how to develop an application that uses the Mina Vårdkontakter (My He
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, Wenghui. "Data Security Enhancement for Web Applications Using Cryptographic Back-end Store." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/235.

Full text
Abstract:
Conventional storage technologies do not always give sufficient guarantees of security for critical information. Databases and file servers are regularly compromised, with consequential theft of identities and unauthorized use of sensitive information. Some cryptographic technologies increase the security guarantees, but rely on a key, and key secrecy and maintenance are difficult problems. Meanwhile, there is an accelerating trend of moving data from local storage to Internet storage. As a result, automatic security of critical information without the need for key management promises to be an
APA, Harvard, Vancouver, ISO, and other styles
39

Dell'Aguzzo, Paolo. "The secret life of software applications." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7405/.

Full text
Abstract:
One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechan
APA, Harvard, Vancouver, ISO, and other styles
40

Singh, Kapil. "Designing security policies and frameworks for web applications." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41122.

Full text
Abstract:
The new developments behind Web 2.0 have increased the complexity of web systems making the task of securing these systems a challenging problem. As a result, end-to-end security for web access has been hindered by the limitations of current web security policies and by the lack of systems that enable effective enforcement of policies. The focus of this dissertation is on how new tools and frameworks may be designed to aid the protection of web systems by acting as policy specification and enforcement points. In particular, we develop a set of policies and frameworks for three web players--the
APA, Harvard, Vancouver, ISO, and other styles
41

O'Neill, Adam. "Stronger security notions for trapdoor functions and applications." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/37109.

Full text
Abstract:
Trapdoor functions, introduced in the seminal paper of Diffie and Hellman, are a fundamental notion in modern cryptography. Informally, trapdoor functions are injective functions that are easy to evaluate but hard to invert unless given an additional input called the trapdoor. Specifically, the classical security notion considered for trapdoor functions is one-wayness, which asks that it be hard to invert (except with very small probability) a uniformly random point in the range without the trapdoor. Motivated by the demands of emerging applications of cryptography as well as stronger secur
APA, Harvard, Vancouver, ISO, and other styles
42

Carrara, Elisabetta. "Security for IP multimedia applications over heterogeneous networks." Licentiate thesis, Stockholm : Dept. of Microelectronics and Information Technology, Royal Institute of Technology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Rohrmair, Gordon Thomas. "Use of CSP to verify security-critical applications." Thesis, University of Oxford, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Khan, Eraj. "Rank codes and their applications to communication security." Thesis, Lancaster University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.658056.

Full text
Abstract:
Today, computer networks are utilized for the sharing of information and resources more than ever before. Data transmitted over any network can exposed to many devious activities. To protect the information flowing through these networks involves the design and implementation of systems that maintain security. The aim of this thesis is to investigate Rank codes for implementing communication security techniques for different application areas. This thesis can be divided into three parts. Each of these parts are summarized below: Wireless sensor networks are increasingly becoming viable solutio
APA, Harvard, Vancouver, ISO, and other styles
45

Pontius, Brandon H. "Information security considerations for applications using Apache Accumulo." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43980.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>NoSQL databases are gaining popularity due to their ability to store and process large heterogeneous data sets more efficiently than relational databases. Apache Accumulo is a NoSQL database that introduced a unique information security feature—cell-level access control. We study Accumulo to examine its cell-level access control policy enforcement mechanism. We survey existing Accumulo applications, focusing on Koverse as a case study to model the interaction between Accumulo and a client application. We conclude with a discussion of po
APA, Harvard, Vancouver, ISO, and other styles
46

El-Werfelli, Mahmud H. "Genetic algorithms applications to power system security schemes." Thesis, University of Bath, 2009. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518121.

Full text
Abstract:
This thesis details the approaches which aim to automatically optimize power system security schemes. In this research, power system security scheme includes two main plans. The first plan, which is called the defence plan scheme, is about preventing cascading blackouts while the second plan, which is called the restoration plan, is about rebuilding the power system in case of failure of the first plan. Practically, the defence plan includes under-frequency load shedding and under-frequency islanding schemes. These two schemes are always considered the last stage of the defensive actions again
APA, Harvard, Vancouver, ISO, and other styles
47

Feleke, Nebiyu A. "Security analysis of finance and healthcare android applications." Thesis, Boston University, 2013. https://hdl.handle.net/2144/12099.

Full text
Abstract:
Thesis (M.S.)--Boston University<br>Android is a major mobile operating system pre-installed and shipped with more than 60% of smart-phones in the market. The open source nature of android en- courages developers to innovate wide-range of applications. Meantime, the sweeping android acceptance with individuals and industries caught the attention of malicious software writers, which led to a sharp increase of security threats. Such threats raise a deeper concern in financial and healthcare applications that are inherently bound to handle private and sensitive information. The research provides
APA, Harvard, Vancouver, ISO, and other styles
48

Vaziripour, Elham. "Usable Security and Privacy for Secure Messaging Applications." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/8830.

Full text
Abstract:
The threat of government and corporate surveillance around the world, as well as the publicity surrounding major cybersecurity attacks, have increased interest in secure and private end-to-end communications. In response to this demand, numerous secure messaging applications have been developed in recent years. These applications have been welcomed and publically used not just by political activists and journalists but by everyday users as well. Most of these popular secure messaging applications are usable because they hide many of the details of how encryption is provided. The strength of th
APA, Harvard, Vancouver, ISO, and other styles
49

Aljamea, Mudhi Mohammed. "Advances in string algorithms for information security applications." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/advances-in-string-algorithms-for-information-security-applications(93f6c82c-8b7a-4fb1-a0bd-29f14549d57c).html.

Full text
Abstract:
This thesis focuses on introducing novel algorithms in information security through studying successful algorithms in bioinformatics and adapting them to solve some open problems in information security. Although, the problems in both bioinformatics and information security are different, yet, they might be considered very similar when it comes to identifying and solving them using Stringology techniques. Different successful bioinformatics algorithms have been studied and introduced to solve different security problems such as malware detection, biometrics and big data. Firstly, we present a
APA, Harvard, Vancouver, ISO, and other styles
50

Chaulagain, Dewan. "Hybrid Analysis of Android Applications for Security Vetting." Bowling Green State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1555608766287613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!