Articles with "secure coding" as a keyword



Photo from wikipedia

Secure Coding for Type II Quantum Wiretap Channel

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-018-3845-9

Abstract: This paper considers the problem of secure coding design for a type II quantum wiretap channel, where the main channel and the eavesdropper channel are both quantum channel, and the eavesdropper overhears the legitimate communication… read more here.

Keywords: quantum; quantum wiretap; type quantum; secure coding ... See more keywords
Photo from wikipedia

Analysis of Web Application Code Vulnerabilities using Secure Coding Standards

Sign Up to like & get
recommendations!
Published in 2017 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-016-2362-5

Abstract: The evolution of modern web application involves a broad range of web technologies such as ActiveX, JavaScript and CGI. It mitigates the demand of bolt-on security services, but remains suffered from code vulnerabilities. Two common… read more here.

Keywords: web application; code vulnerabilities; secure coding; code ... See more keywords
Photo by lucabravo from unsplash

Embedding Secure Coding Instruction Into the IDE: Complementing Early and Intermediate CS Courses With ESIDE

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Educational Computing Research"

DOI: 10.1177/0735633117708816

Abstract: Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on… read more here.

Keywords: embedding secure; coding instruction; secure coding; secure ... See more keywords