Preventing SQL Injection Attacks Using a Cryptography Technique

dc.contributor.authorRadjai, Marwan
dc.date.accessioned2018-02-07T10:17:21Z
dc.date.available2018-02-07T10:17:21Z
dc.date.issued2016
dc.description.abstractWith the spread of Internet use in the world, security threats in the Internet increased dramatically. Among the vulnerabilities of the web application is SQL injection, which is based on the insertion of malicious requests to the DBMS, which executes these requests denier allowing access to sensitive and confidentiel data. The purpose of this research paper is to find the best way to protect Web applications and sensitive data against hackers and security breaches through the use of effective encryption systems which, in turn, provide a significant degree of protection for Web applications. We made a thorough study of the different optimal strategies based on encryption in their content. We dealt with the e-Signature and its effective role in the protection of data. We applied encryption algorithms such as ECC, NTRUand of some of the techniques used to protect and prevent contaminated queries that are entered by the attacker.en_US
dc.identifier.urihttp://dspace.univ-msila.dz:8080//xmlui/handle/123456789/2530
dc.language.isoenen_US
dc.publisherFaculty of Mathematics and Informatics- Unviversity Mohamed MOHAMED - M’SILAen_US
dc.subjectECC, RSA, SQL, SQLI, NTRU, Elgmal, PHPMyadmin.en_US
dc.titlePreventing SQL Injection Attacks Using a Cryptography Techniqueen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 3 of 3
No Thumbnail Available
Name:
Marwan Radjai.rar
Size:
3.24 MB
Format:
Unknown data format
Description:
No Thumbnail Available
Name:
Marwan Radjai.rar
Size:
3.24 MB
Format:
Unknown data format
Description:
No Thumbnail Available
Name:
Marwan Radjai.rar
Size:
3.24 MB
Format:
Unknown data format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections