Filters








25,356 Hits in 2.7 sec

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Thai Duong, Juliano Rizzo
2011 2011 IEEE Symposium on Security and Privacy  
This paper discusses how cryptography is misused in the security design of a large part of the Web.  ...  Finally, we give some reasons why cryptography is often misused in web technologies, and recommend steps to avoid these mistakes.  ...  First of all, we would like to thank William Robertson, Ned Bass and the anonymous reviewers for their work and valuable comments that have significantly improved the quality of our initial manuscript.  ... 
doi:10.1109/sp.2011.42 dblp:conf/sp/DuongR11 fatcat:l42tjbyykfg6ngy3byqlzyu2y4

Web Security based on the Application of Cryptography

Manisha. O
2019 International Journal for Research in Applied Science and Engineering Technology  
The concept of cryptography has been developed using the basic building blocks, such as the classical ciphers and transposition operations, which paved the way for today's modern powerful ciphers such  ...  The branch of cryptography deals with the methodologies for conveying information securely.  ...  TYPES OF CRYPTOGRAPHY There are several different ways to classify cryptography, and here its categorized based on the number of keys employed for encryption and decryption and also further defined by  ... 
doi:10.22214/ijraset.2019.9137 fatcat:fnykktgzujei3czd4zhtmsev3i

Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources [chapter]

Thanassis Tiropanis, Tassos Dimitriou
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
This paper proposes the use of ID-based cryptography (IBC) to address requirements for integrity and authenticity of Web resources using either the URL/URI of a resource or the DNS name part of if.  ...  As the amount of information resources on the Web keeps increasing so are the concerns for information integrity, confidentiality and authenticity.  ...  To this end we propose the use of Identity-Based Cryptography (IBC) as an efficient and scalable way of guaranteeing the authenticity and integrity of Web resources using an IBC-based system for efficiently  ... 
doi:10.1007/978-3-642-05284-2_20 fatcat:4mazj2i5z5aabpxhzqhfn4fkba

Web-based Fingerprinting Techniques

Vítor Bernardo, Dulce Domingos
2016 Proceedings of the 13th International Joint Conference on e-Business and Telecommunications  
The current work identifies known web-based fingerprinting techniques, categorizing them as which ones are browser and which are cross-browser and showing real examples of the data that can be captured  ...  The concept of device fingerprinting is based in the assumption that each electronic device holds a unique set of physical and/or logical features that others can capture and use to differentiate it from  ...  ACKNOWLEDGEMENTS This work is partially supported by National Funding from FCT -Fundação para a Ciência e a Tecnologia, under the project UID/CEC/00408/2013.  ... 
doi:10.5220/0005965602710282 dblp:conf/secrypt/BernardoD16 fatcat:7pjl32qmzbcpva36ai52wt6wvm

Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory

Diogo Barradas, Tiago Brito, David Duarte, Nuno Santos, Luís Rodrigues
2017 Proceedings of the 14th International Joint Conference on e-Business and Telecommunications  
Then, we introduce RAMAS, an extensible forensic tool which aims to ease the process of analyzing communication records left behind in physical memory by instant-messaging and email web clients.  ...  In this paper, we analyze in-memory communication records produced by web-based instant messaging and email applications.  ...  ACKNOWLEDGMENTS This work was partially supported by the EC through project H2020-645342 (reTHINK), and through Fundação para a Ciência e a Tecnologia (FCT) with reference UID/CEC/50021/2013 (INESC-ID)  ... 
doi:10.5220/0006396100430054 dblp:conf/secrypt/BarradasBD0R17 fatcat:iznhs2su7vcntgypxmy665rgru

The application of machine learning method and analysis attributes of queries for detecting attacks on web applications
Применение метода машинного обучения и анализа атрибутов запроса в задачах обнаружения атак на веб-приложения

M.T. Nguyen, Contributor, Academy of Cryptography Techniques Viet Nam. 134800, Viet Nam, Ha noi City, Thanh tri, Tan trieu, Chien thang, house.
2019 Journal of the Ural Federal district Information security  
Для защиты Веб-ресурсов от атак на прикладном уровне существуют специальные средства, в том числе, межсетевой экран для вебприложения (WAF -Web Application Firewall).  ...  Attacks on Web resources most often occur at the application level, in the form of HTTP / HTTPS-requests to the site, where traditional firewalls have limited capabilities for analysis and detection attacks  ...  This article presents some features of anomaly detection existed in the systems detection attacks and working principles of open source Web application firewall ModSecurity, in which uses machine learning  ... 
doi:10.14529/secur190306 fatcat:imgav6drajcsrhh42tzlekaaw4

AN EFFECTIVE CLUSTERING APPROACH TO WEB QUERY LOG ANONYMIZATION
english

2010 Proceedings of the International Conference on Security and Cryptography   unpublished
In this work we model web query logs as unstructured transaction data and present a novel transaction anonymization technique based on clustering and generalization techniques to achieve the k-anonymity  ...  Web query log data contain information useful to research; however, release of such data can re-identify the search engine users issuing the queries.  ...  This research was supported by a Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Grant.  ... 
doi:10.5220/0002924901090119 fatcat:iwqb7fknvbaavgn2nc5kazbffe

The W3C web cryptography API

Harry Halpin
2014 Proceedings of the 23rd International Conference on World Wide Web - WWW '14 Companion  
We describe the motivations behind the creation of the W3C Web Cryptography API and give a high-level overview with motivating usecases while addressing objections.  ...  The W3C Web Cryptography API is the standard API for accessing cryptographic primitives in Javascript-based environments.  ...  The issue of using keys as 'super-cookies' caused the separation of Web Cryptography Key Discovery from the Web Cryptography API and so may lead it to be non-normative. [7] .  ... 
doi:10.1145/2567948.2579224 dblp:conf/www/Halpin14 fatcat:u2dakieb35a6nontjr5i62awsq

IDENTITY BASED CRYPTOGRAPHY FOR CLIENT SIDE SECURITY IN WEB APPLICATIONS (WEBIBC)

Archana B.Kadga .
2014 International Journal of Research in Engineering and Technology  
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the security and privacy of the  ...  In this paper, we present WebIBC, which integrates public key cryptography into web applications without any browser plugins.  ...  SECURITY OF CRYPTOGRAPHY The security of WebIBC depends on the security of cryptography algorithms it applies. We will discuss the security of these cryptography algorithms from theory and practice.  ... 
doi:10.15623/ijret.2014.0315034 fatcat:mswbz7puajejrj7udepxuoragy

Cryptography: A New Open Access Journal

Kwangjo Kim
2016 Cryptography  
Everyone can understand that security and privacy, as well as cryptography, are everywhere.  ...  In 2000, Berson [6] gave the IACR (International Association for Cryptologic Research) distinguished lecture entitled "Cryptography Everywhere" at Asiacrypt2000: "The past twenty years have seen cryptography  ...  Open access provides several advantages, including free access via the web for anyone interested, rapid publication, literature is immediately released in open access format and the published material  ... 
doi:10.3390/cryptography1010001 fatcat:xpus2kfgpbbdfe2a2g55to4lnu

Web Browser Artefacts using Cryptographic Examination

2019 International journal of recent technology and engineering  
The proposed system makes use of the advantages of both the methods by presenting a hybrid technique of encoding and encryption, resulting in a much secured and faster alternative of storing web browser  ...  Private browsers, in general, offer security and privacy by allowing users to browse the web without leaving usual traces on their computers.  ...  ACKNOWLEDGMENT The authors honourably appreciate National Defence University of Malaysia for the research university grant UPNM/2019/GPJP/TK/17.  ... 
doi:10.35940/ijrte.d8358.118419 fatcat:n5nabfydkjfmlpo4cg7fyxkrma

Visualizing the Citation Patterns of Quantum Cryptography Research Publications: A Study using CiteNet Explorer

Maheswaran R.
2019 Journal of Data Processing  
The data were extracted from the web of science database which is maintained by Thomson Reuters.  ...  Further, this study also presents the visualization of publications, citation network, cluster analysis and core publications in Quantum cryptography research output.  ...  The research productivity of Quantum cryptography was analyzed. The following search strategy has been used to download data from the web of science database.  ... 
doi:10.6025/jdp/2019/9/1/19-25 fatcat:gaq4trhdzff2tlqy6bs4npdcay

WebIBC: Identity Based Cryptography for Client Side Security in Web Applications

Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhong Chen, Xianghao Nan
2008 2008 The 28th International Conference on Distributed Computing Systems  
In this paper, we present WebIBC, integrate public key cryptography into web applications without any browser plugins.  ...  The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the security and privacy of the  ...  Related Work Public key cryptography based solutions for the desktop counterpart of the above web applications have been deployed widely for many years.  ... 
doi:10.1109/icdcs.2008.24 dblp:conf/icdcs/GuanCZCCN08 fatcat:w5jzkhzkofdrfl2ym7sx2kskrq

User-visible cryptography in email and web scenarios

Phil Brooke, Richard Paige
2015 Information and Computer Security  
and the use of cryptography in web and email systems respectively.  ...  Much cryptography occurs in the background: we do not consider this to be user-visible cryptography. Web browsers and email clients can automatically use SSL as discussed in Sections 4.2 and 4.3.  ... 
doi:10.1108/ics-07-2013-0054 fatcat:wtnxkreq3fcnlbmznig7rii5im

Security Analysis of the W3C Web Cryptography API [chapter]

Kelsey Cairns, Harry Halpin, Graham Steel
2016 Lecture Notes in Computer Science  
As a case example of this, we discuss in detail the W3C Web Cryptography API.  ...  We expect this sort of formal methodology to be applied to new standardization efforts at the W3C such as the W3C Web Authentication API.  ...  Thus, the W3C Web Cryptography API is the primary Web-facing cryptography API for the foreseeable future.  ... 
doi:10.1007/978-3-319-49100-4_5 fatcat:mzooub23indp3nar2afh4evbqq
« Previous Showing results 1 — 15 out of 25,356 results