Web Session Security: Attack and Defense Techniques

[1]  Hossein Saiedian,et al.  An Analytical Study of Web Application Session Management Mechanisms and HTTP Session Hijacking Attacks , 2013, Inf. Secur. J. A Glob. Perspect..

[2]  Abdelkader H. Ouda,et al.  Security Protocols in Service-Oriented Architecture , 2010, 2010 6th World Congress on Services.

[3]  Xing Wang,et al.  Attacks against Two Identity-Based Signcryption Schemes , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[4]  Gang Yu,et al.  Provable secure identity based generalized signcryption scheme , 2010, Theor. Comput. Sci..

[5]  Joachim Posegga,et al.  Session Fixation - The Forgotten Vulnerability? , 2010, Sicherheit.

[6]  Yong Yu,et al.  Identity based signcryption scheme without random oracles , 2009, Comput. Stand. Interfaces.

[7]  Manuel Barbosa,et al.  Certificateless signcryption , 2008, ASIACCS '08.

[8]  Ming Li,et al.  Further Cryptanalysis of a Provably Secure CRT-RSA Algorithm , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[9]  Joonsang Baek,et al.  Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.

[10]  Martin Johns SessionSafe: Implementing XSS Immune Session Handling , 2006, ESORICS.

[11]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[12]  Liqun Chen,et al.  Improved Identity-Based Signcryption , 2005, Public Key Cryptography.

[13]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[14]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[15]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[16]  Tal Rabin,et al.  On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.

[17]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[18]  Ron Steinfeld,et al.  A Signcryption Scheme Based on Integer Factorization , 2000, ISW.

[19]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.