Back to Results
First PageMeta Content
Cross-site request forgery / HTTP / Computer network security / Cross-site scripting / Session hijacking / HTTP cookie / Session fixation / Password / JavaScript / Computer security / Cyberwarfare / Computing


A User-level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities 1 1
Add to Reading List

Document Date: 2015-02-24 12:13:25


Open Document

File Size: 259,98 KB

Share Result on Facebook

/

Facility

University of Passau / Joachim Posegga Institute of IT-Security / We shed / /

IndustryTerm

target web page / web sessions / access web applications / web applications / online shopping trip / regular web participant / communication infrastructure / Web Session-based Attacks The / actual solution / web browsers / erent web application / stateless protocol / web application / target web application / Web Session-Based Vulnerabilities / stefan.kucher@web.de / online shop / respective web application / fallback solution / personalized services / remote applications / actual web page / protected web application / applicable solution / web session implementations / /

MusicAlbum

PIN / /

Organization

Security Law / University of Passau / U.S. Securities and Exchange Commission / Joachim Posegga Institute of IT-Security / /

Person

Martin Johns / Joachim Posegga / Bastian Braun / Stefan Kucher / /

ProgrammingLanguage

JavaScript / /

Technology

SMS / smartphones / stateless protocol / HTTP / GSM / SSL / /

URL

http /

SocialTag