Web-Proxy-Based Authentication and Authorization Mechanism Against Client-Based HTTP Attacks

M Bukkawar, MS Pathan - International Journal of Synthetic …, 2017 - igi-global.com
There has been a huge development in how to read a data from sensor device such as
infrared (IR) device, temperature device, etc. Sensor data collection has wide issues of …

HTTPI based web service security over SOAP

P Choudhary, R Aaseri, N Roberts - arXiv preprint arXiv:1306.1740, 2013 - arxiv.org
Now a days, a new family of web applications open applications, are emerging (eg, Social
Networking, News and Blogging). Generally, these open applications are non-confidential …

Integrated security for data transfer and access control using authentication and cryptography technique for Internet of things

SK Sharma, B Khuntia - International Journal of Knowledge …, 2020 - content.iospress.com
The entire world is running behind the smart technology to accomplish the daily needs in a
smart way such as smart farming, smart irrigation system, smart transportation system, smart …

[PDF][PDF] AUTHENTICATION AND AUTHORIZATION FOR USER ROLES AND DEVICE FOR ATTACK DETECTION IN RELATIONAL DATA

MAV Bhadke, J Raghatwan - 2017 - academia.edu
Now a day's information security is worried for digital assaults, malicious activity, cyber
crime, etc. Information sharing in industrial territory has lost protection of the information like …

Web proxy based detection and protection mechanisms against client based HTTP attacks

P Pandiaraja, J Manikandan - 2015 international conference on …, 2015 - ieeexplore.ieee.org
A server side protection from client based DDoS attacks on multilevel proxy. DDoS attacks
are continuously sent the threat to the network applications. Such attacks are created by …

[PDF][PDF] Proposed Secure Method for Web of Things Purposes

S Habeeb, RF Hassan - Iraqi Journal of Information Technology. V, 2018 - iasj.net
129 Iraqi Journal of Information Technology. V. 8 N. 3. 2018 web services which might be
found, connected and performed. Therefore enrichening the range of the standard web …

Development of Authentication Protocol for Enhancing Security in E Commerce Application

V Jotwani - shodhganga.inflibnet.ac.in
With the growth of ecommerce application and widespread utility of internet. Users can
access information from faraway server from anywhere anytime through public channel. With …

[PDF][PDF] Secure Session Protocol-Concept and Implementation of a Protocol to Securely Operate Web Applications

B von Web Anwendungen - 2014 - download.hrz.tu-darmstadt.de
The importance of web services has steadily increased over the last couple of years.
Furthermore, web services have often the requirement to be usable on any device, including …

Comparison of authentication methods in internet of things technology

HC Hasan, FN Yusof, M Daud - International Journal of …, 2018 - publications.waset.org
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected
and automated, allowing the devices to analyze data and execute actions based on the …

Research on WebSocket-Based Authentication System

W Guyang, Y Shulin, R Xuelei, W Bin - Proceedings of the 2017 VI …, 2017 - dl.acm.org
In regular HTTP requests, complex authentication is often required. Also, the HTTP-based
connection is a stateless short connection, which improves the complexity of the system …