[PDF][PDF] A comparison the level of security on top 5 open source NoSQL databases

P Noiumkar, T Chomsiri - The 9th international conference on …, 2014 - researchgate.net
This research investigated the effective factors on the security of the top 5 open source
NoSQL databases which are MongoDB, Cassandra, CouchDB, Hypertable, and Redis …

[PDF][PDF] Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers,''

SZS Idrus, SA Aljunid, SM Asi, S Sudin… - … International Journal of …, 2008 - researchgate.net
Information can easily be acquired over the Internet, as we know it today. Some are meant to
be visible, while others are considered to be sensitive and meant to be secretive. This …

FPGA based sliding window architecture for RC5 encryption

AR Bevi, SSV Sheshu, S Malarvizhi - Proceedings of the International …, 2012 - dl.acm.org
In the current scenario, security for the data has more of its concern. Many encryption
algorithms have been proposed to satisfy certain levels of security issues and known for …

[PDF][PDF] Web Browsers Security Web-Lab.

M Serrhini, AA Moussa - International Journal of Interactive Mobile …, 2013 - core.ac.uk
Web Browser. Today's platform is unique software used to access online data for lot of
electronic transactions services such as e-mail, e-banking, e-commerce, and e-learning etc …

QoS web service Security Access Control case study using HTTP Secured Socket Layer Approach

MS Das, A Govardhan, DV lakshmi - Proceedings of the The …, 2015 - dl.acm.org
Web services are expected to play significant role in message communications over internet
applications. Most of the future work is web security. Online shopping and web services are …

WASM A metric for securing a web application

R Kumar, G Kaur - Journal of Research and Practice in …, 2014 - search.informit.org
Internet is a medium to connect millions of computers which share and access information
all over the world. With the evolution of the web and its increased use in every aspect of life …

Multidimensional key RC6 algorithm

REJ Paje, AM Sison, RP Medina - … of the 3rd International Conference on …, 2019 - dl.acm.org
Data confidentiality grows equally important along with technological advancement.
Encryption technique is an essential aspect of information security. The security of …

[PDF][PDF] Database security using intrusion detection system

Y Dawle, M Naik, S Vande, N Zarkar - Database, 2017 - academia.edu
We propose a project named “Database Security Using IDS”. SQL injection attack is the
most common attack in websites now-a-days. SQL Injection refers to an injection attack …

[PDF][PDF] A survey on security and vulnerabilities of web application

GR Chaudhari, MV Vaidya - International Journal of Computer …, 2014 - academia.edu
Web applications are the distributed platform used for information sharing and services over
Internet today. They are increasingly used for the financial, government, healthcare and …

Web Security and Web Application Security: Attacks and Prevention

BR Bhimireddy, A Nimmagadda… - 2023 9th …, 2023 - ieeexplore.ieee.org
The everyday life of a person goes on with the assistance of the internet at present. Without
the internet, there is nothing that a person can do. As the days of the internet are evolving …