Security Mechanisms in Hybrid Environments: The Case of Token Online Application
| dc.contributor.author | Ozdenizci Kose, Büşra | |
| dc.contributor.author | Coşkun, Vedat | |
| dc.contributor.author | Capa, Mustafa Ozan | |
| dc.contributor.author | Uluoz, Hakan | |
| dc.date.accessioned | 2025-10-29T12:08:14Z | |
| dc.date.issued | 2024 | |
| dc.department | Gebze Teknik Üniversitesi | |
| dc.description | 6th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, HORA 2024 -- Istanbul -- 200165 | |
| dc.description.abstract | As hybrid applications become more widespread in today's digital environment, it is crucial to enhance their security to protect against a wide range of threats. The Token Online Application (TOA) provides a valuable case study for examining the integration of security and communication within online/offline hybrid environments. This study aims to present a comprehensive analysis of TOA’s security architecture, communication protocols, and data management strategies. This study explores the application's use of advanced cryptographic techniques, including key management for Terminal Master Keys (TMK) and Zone Master Keys (ZMK), and its employment of Type-Length-Value (TLV) data structures for enhanced data integrity and flexibility. The study also focuses on the application's robust communication protocols, which ensure secure and efficient data exchanges across variable network conditions. By highlighting the challenges encountered and the solutions implemented in TOA, this study offers insights for developers and integrators working on or with hybrid platforms. The findings underscore the importance of a layered security approach and the need for continuous adaptation to emerging security technologies and threats. Through this detailed exploration, the study contributes to the broader understanding of securing hybrid applications. © 2024 Elsevier B.V., All rights reserved. | |
| dc.identifier.doi | 10.1109/HORA61326.2024.10550745 | |
| dc.identifier.isbn | 9798350394634 | |
| dc.identifier.scopus | 2-s2.0-85196755725 | |
| dc.identifier.scopusquality | N/A | |
| dc.identifier.uri | https://doi.org/10.1109/HORA61326.2024.10550745 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14854/14384 | |
| dc.indekslendigikaynak | Scopus | |
| dc.language.iso | en | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | |
| dc.rights | info:eu-repo/semantics/closedAccess | |
| dc.snmz | KA_Scopus_20251020 | |
| dc.subject | application security | |
| dc.subject | communication protocols | |
| dc.subject | cryptographic techniques | |
| dc.subject | Hybrid applications | |
| dc.subject | key management | |
| dc.subject | token online application | |
| dc.title | Security Mechanisms in Hybrid Environments: The Case of Token Online Application | |
| dc.type | Conference Object |









