<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="16690" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/16690?output=omeka-xml" accessDate="2026-05-02T10:37:34+00:00">
  <collection collectionId="5">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="64">
                <text>Articles</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="19">
    <name>Article</name>
    <description>Faculty Publications -Articles</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130313">
              <text>Signature based key exchange for securing data and user from web data stealing attacks</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130314">
              <text>Data Stealing Attacks; Data Theft; Mutual Authentication; Signature based Key Exchange; Web Application Securit</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130315">
              <text>Due to the immense technological growth, web and its related applications are becoming a major part of everyday life. The growth of the internet and technology not only increases the positive benefits but also increases negative activities such as data theft. As web applications are used frequently for many online services, it is the most common and valuable target for the adversary to host any web vulnerabilities. Data theft or data stealing attacks are quite common in the web and the internet with severe consequences. The private data are generally stored on the system which gives an opportunity for the attacker to steal the data from the storage or during transit. However, apart from stealing the critical data from the user, the attacker also steals the sensitive data from the web applications. This type of attack takes several forms for stealing perilous information from the user and web application. Unfortunately, these attacks are easy to execute as the attacker needs only the internet connection, a web server and technical knowledge which are readily available. Several prevention strategies exist to thwart the user and the application from the web attacks, however, they do not provide the complete solution. This paper presents the signature based key exchange to prevent the user as well as the web application from several variations of data stealing attacks through mutual attestation. The experimental results show that the proposed method prevents the user and application from data theft than any other existing methods.  BEIESP.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130316">
              <text>Arumugam S.; Subramaniam S.B.; Kirubanand V.B.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="130317">
              <text>International Journal of Recent Technology and Engineering, Vol-7, No. 6, pp. 531-539.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="130318">
              <text>Blue Eyes Intelligence Engineering and Sciences Publication</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130319">
              <text>2019-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="130320">
              <text>&lt;a href="" target="_blank" rel="noreferrer noopener"&gt;&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85066746677&amp;amp;partnerID=40&amp;amp;md5=ab151f21d8d14bce30467246c9fc9ae5" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85066746677&amp;amp;partnerID=40&amp;amp;md5=ab151f21d8d14bce30467246c9fc9ae5&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130321">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="130322">
              <text>ISSN: 22773878</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130323">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130324">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="130325">
              <text>Article</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="130326">
              <text>Arumugam S., Department of MCA, Sree Saraswathi Thyagaraja College, Pollachi, 642205, Tamil Nadu, India; Subramaniam S.B., 483, Lawley Road, Coimbatore, 641003, Tamil Nadu, India; Kirubanand V.B., Department of Computer Science, Christ University, Hosur Road, Bengaluru, 560029, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
