Kiransinh Borasia's research while affiliated with VIT University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (3)
This paper is aimed to evaluate the importance of XML Signature and XML
Encryption in Web Service Security. In today's business scenario, organizations
are investing huge amount of resources in Web Services. Web Service
Transactions are done mainly through plain-text XML formats like SOAP and WSDL,
hence hacking into them is not a tedious task. XML...
This paper is aimed to present the importance and implementation of an
incremental call graph plugin. An algorithm is proposed for the call graph
implementation which has better overall performance than the algorithm that has
been proposed previously. In addition to this, the algorithm has been
empirically proved to have excellent performance on re...
This review is aimed to evaluate the importance of Symmetric Key Cryptography
for Security in Distributed Systems. Businesses around the world as well as
research and other such areas rely heavily on distributed systems these days.
Hence, security is also a major concern due to the openness of the system. Out
of the various available security measu...
Citations
... The distinctive feature of an XML signature according to [3] is its flexibility and the fact that it is embedded in an XML document. The characteristics of these features are detailed and described in the literature, e.g., [2], [8], [26], [29]. ...
... Cryptography is a technique used to encode and decode a message [1]. This technique is used to avoid unauthorized access to data [2]. ...