Web Session Security: Attack and Defense Techniques
暂无分享,去创建一个
[1] Hossein Saiedian,et al. An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking Attacks , 2013, Inf. Secur. J. A Glob. Perspect..
[2] Abdelkader H. Ouda,et al. Security Protocols in Service-Oriented Architecture , 2010, 2010 6th World Congress on Services.
[3] Xing Wang,et al. Attacks against Two Identity-Based Signcryption Schemes , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[4] Gang Yu,et al. Provable secure identity based generalized signcryption scheme , 2010, Theor. Comput. Sci..
[5] Joachim Posegga,et al. Session Fixation - The Forgotten Vulnerability? , 2010, Sicherheit.
[6] Yong Yu,et al. Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.
[7] Manuel Barbosa,et al. Certificateless signcryption , 2008, ASIACCS '08.
[8] Ming Li,et al. Further Cryptanalysis of a Provably Secure CRT-RSA Algorithm , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[9] Joonsang Baek,et al. Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.
[10] Martin Johns. SessionSafe: Implementing XSS Immune Session Handling , 2006, ESORICS.
[11] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[12] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[13] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[14] Siu-Ming Yiu,et al. Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.
[15] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[16] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[17] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[18] Ron Steinfeld,et al. A Signcryption Scheme Based on Integer Factorization , 2000, ISW.
[19] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.