Journal articles on the topic 'Client-side Web Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 25 journal articles for your research on the topic 'Client-side Web Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shahriar, Hossain, and Hisham M. Haddad. "Client-Side Detection of Clickjacking Attacks." International Journal of Information Security and Privacy 9, no. 1 (January 2015): 1–25. http://dx.doi.org/10.4018/ijisp.2015010101.
Full text., Archana B. Kadga. "IDENTITY BASED CRYPTOGRAPHY FOR CLIENT SIDE SECURITY IN WEB APPLICATIONS (WEBIBC)." International Journal of Research in Engineering and Technology 03, no. 15 (May 25, 2014): 181–86. http://dx.doi.org/10.15623/ijret.2014.0315034.
Full textShukla, Samiksha, D. K. Mishra, and Kapil Tiwari. "Performance Enhancement of Soap Via Multi Level Caching." Mapana - Journal of Sciences 9, no. 2 (November 30, 2010): 47–52. http://dx.doi.org/10.12723/mjs.17.6.
Full textLesko, S. A. "Models and scenarios of implementation of threats for internet resources." Russian Technological Journal 8, no. 6 (December 18, 2020): 9–33. http://dx.doi.org/10.32362/2500-316x-2020-8-6-9-33.
Full textLiu, Bing Qi, Hui Lan Jiang, and Jing Peng Wang. "Client-Side in Management System of Transmission Line Passage Protection Based on Android." Advanced Materials Research 986-987 (July 2014): 2139–42. http://dx.doi.org/10.4028/www.scientific.net/amr.986-987.2139.
Full textHall, Calum, Lynsay Shepherd, and Natalie Coull. "BlackWatch: Increasing Attack Awareness within Web Applications." Future Internet 11, no. 2 (February 15, 2019): 44. http://dx.doi.org/10.3390/fi11020044.
Full textHossain, Md Shohrab, Arnob Paul, Md Hasanul Islam, and Mohammed Atiquzzaman. "Survey of the Protection Mechanisms to the SSL-based Session Hijacking Attacks." Network Protocols and Algorithms 10, no. 1 (April 1, 2018): 83. http://dx.doi.org/10.5296/npa.v10i1.12478.
Full textCerny, Tomas, Miroslav Macik, Michael Donahoo, and Jan Janousek. "On distributed concern delivery in user interface design." Computer Science and Information Systems 12, no. 2 (2015): 655–81. http://dx.doi.org/10.2298/csis141202021c.
Full textČepický, Jáchym, and Luís Moreira de Sousa. "New implementation of OGC Web Processing Service in Python programming language. PyWPS-4 and issues we are facing with processing of large raster data using OGC WPS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B7 (June 22, 2016): 927–30. http://dx.doi.org/10.5194/isprsarchives-xli-b7-927-2016.
Full textČepický, Jáchym, and Luís Moreira de Sousa. "New implementation of OGC Web Processing Service in Python programming language. PyWPS-4 and issues we are facing with processing of large raster data using OGC WPS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B7 (June 22, 2016): 927–30. http://dx.doi.org/10.5194/isprs-archives-xli-b7-927-2016.
Full textSrivastava, Tushar, Ashutosh Pandey, and Rizwan Khan. "A Study of Node.js Using Injection Vulnerabilities." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 5 (June 2, 2018): 64. http://dx.doi.org/10.23956/ijarcsse.v8i5.666.
Full textBilal, Muhammad, Muhammad Asif, and Abid Bashir. "Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications." Security and Communication Networks 2018 (November 1, 2018): 1–10. http://dx.doi.org/10.1155/2018/6315039.
Full textBoreiko, Maksym, and Mykola Budnyk. "Development of the Remote Heart Health Monitoring System." Cybernetics and Computer Technologies, no. 2 (June 30, 2021): 90–98. http://dx.doi.org/10.34229/2707-451x.21.2.10.
Full textEt. al., Leelavathy S,. "A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 341–46. http://dx.doi.org/10.17762/turcomat.v12i2.722.
Full textZhang, Zhiyi, Michał Król, Alberto Sonnino, Lixia Zhang, and Etienne Rivière. "EL PASSO: Efficient and Lightweight Privacy-preserving Single Sign On." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 70–87. http://dx.doi.org/10.2478/popets-2021-0018.
Full textShanmuga Priya, S., Dr A.Valarmathi, M. Rizwana, and Dr L.Mary Gladence. "Enhanced Mutual Authentication System in Mobile Cloud Environments." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 192. http://dx.doi.org/10.14419/ijet.v7i3.34.18962.
Full textBerti, G., G. Engelbrecht, J. Fingberg, G. Kohring, S. E. Middleton, R. Schmidt, and S. Benkner. "GEMSS: Grid-infrastructure for Medical Service Provision." Methods of Information in Medicine 44, no. 02 (2005): 177–81. http://dx.doi.org/10.1055/s-0038-1633941.
Full text"Upgraded Web Architecture for Mail Security and Customization." International Journal of Innovative Technology and Exploring Engineering 9, no. 7 (May 10, 2020): 415–18. http://dx.doi.org/10.35940/ijitee.f4748.059720.
Full textSularso, Eko, Willy Sudiarto Rahardjo, and Yuan Lukito. "IMPLEMENTASI ALGORITMA RIJNDAEL 128 PADA APLIKASI CHATTING BERBASIS HTML5 WEBSOCKET." Jurnal Informatika 10, no. 2 (January 14, 2015). http://dx.doi.org/10.21460/inf.2014.102.326.
Full textHatala, Zulkarnaen. "Prosedur efektif pengembangan aplikasi basis data." JSAI (Journal Scientific and Applied Informatics) 2, no. 1 (January 29, 2019). http://dx.doi.org/10.36085/jsai.v2i1.104.
Full textHR, Mohith Gowda, Adithya MV, Gunesh Prasad S, and Vinay S. "Development of anti-phishing browser based on random forest and rule of extraction framework." Cybersecurity 3, no. 1 (October 14, 2020). http://dx.doi.org/10.1186/s42400-020-00059-1.
Full textChen, Liqun, Kaibin Huang, Mark Manulis, and Venkkatesh Sekar. "Password-authenticated searchable encryption." International Journal of Information Security, November 22, 2020. http://dx.doi.org/10.1007/s10207-020-00524-5.
Full textVlajic, N., X. Y. Shi, H. Roumani, and P. Madani. "Rethinking the Use of Resource Hints in HTML5: Is Faster Always Better!?" Journal of Cyber Security and Mobility, November 19, 2017. http://dx.doi.org/10.13052/2245-1439.625.
Full textMamtora, Rushi, Dr Priyanka Sharma, and Jatin Patel. "Server-Side Template Injection with Custom Exploit." International Journal of Scientific Research in Science, Engineering and Technology, May 10, 2021, 105–8. http://dx.doi.org/10.32628/ijsrset218318.
Full text"PREVENTION OF CROSS SITE SCRIPTING (XSS) AND SECURING WEB APPLICATION AT CLIENT SIDE." International Journal of Advance Engineering and Research Development 4, no. 05 (May 31, 2017). http://dx.doi.org/10.21090/ijaerd.rtde21.
Full text