Uneingeschränkter Zugang

A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID


Zitieren

1. Alex, Chin Huang, Mohamed. A Secure Cookie Protocol. - In: Proc. of IEEE Conference on Network Security, 2007, 333-338.Search in Google Scholar

2. Chomsiri. HTTPS Hacking Protection. - In: Proc. of IEEE International Conference on Advanced Information Networking and Applications, 2007, 42-47.10.1109/AINAW.2007.200Search in Google Scholar

3. Miyazaki, A. D. Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage. - American Marketing Association, Vol. 27, 2008, No 1, 19-33.10.1509/jppm.27.1.19Search in Google Scholar

4. Adida, B. Session Lock: Securing Web Sessions Against Eavesdropping. - In: Proc. of International Conference on Web Client Security, China, 2008, 517-524.Search in Google Scholar

5. Jackson, C., A. Barth. Force HTTPS: Protecting High Security Websites from Network Attacks. - In: Proc. of International Conference on Web Client Security, China, 2008, 536-552.Search in Google Scholar

6. Juels, A., T. Markus. Cache Cookies for Browser Authentication. - In: Proc. of IEEE International Conference on Security and Privacy, 2008.Search in Google Scholar

7. Christopher, Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities. - In: Proc. of IEEE International Conference on Security, 2009.Search in Google Scholar

8. Howard, M. Man-in-the Middle Attack to the HTTPS Protocol. - In: Proc. of IEEE Securiry and Privacy, 2009, 78-81.10.1109/MSP.2009.12Search in Google Scholar

9. Gaw, S., E. W. Felten. Password Management Strategies for Online Accounts. - In: Proc. of International Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, USA, 2006, 44-55.10.1145/1143120.1143127Search in Google Scholar

10. Ritchie, P. The Security Risks of AJAX / Web 2.0 Applications. Network Security, Secure Test, Ltd., UK, 2007.10.1016/S1353-4858(07)70025-9Search in Google Scholar

11. Barth, A., C. Jackson, J. Mitchell. Robust Defenses for Cross Sire Request Forgery. - In: Proc. of ACM International Conference on CCS’08, Virginia, USA, 2008, 75-87.10.1145/1455770.1455782Search in Google Scholar

12. Adida, B. Session Lock:Securing Web Sessions Against Eavesdropping. - In: Proc. of International World Wide Web Conference Committee (IW3C2), ACM, Beijing, China, 2008, 517-524.Search in Google Scholar

13. Wang, F., Y. Zhang. A New Provably Secure Authentication and Key Agreement Mechanisms for SIP Using Certificate Less Public Key Cryptography. 2008, 1-15.10.1109/CIS.2007.113Search in Google Scholar

14. Perdisci, R., D. Ariu, P. Giacinto, W. Lee. McPAD: A Multiple Classifier System for Accurate Payload Based Anomaly Detection. - Journal of Computer Networks, Vol. 53, 2009, No 6, 864-881.10.1016/j.comnet.2008.11.011Search in Google Scholar

15. Eisen, O. Catching the Fraudlent Man-in-the-Middle and Main-in-the-Browser. - Network Security, 2010, No 4, 11-12.10.1016/S1353-4858(10)70046-5Search in Google Scholar

16. Liao, Yi-Pin, S. S. Wang. A New Secure Password Authenticated Key Agreement Scheme for SIP Using Self Certified Public Keys on Elliptic Curves. - Journal of Computer Communications, Vol. 33, 2010, No 3, 372-380.10.1016/j.comcom.2009.10.005Search in Google Scholar

17. Cichon, J., Z. Golebiewski, M. Kutylowski. From Key Pre-Distribution to Key Redistribution. - Journal of Theoretical Computer Science, Vol. 45, 2012, No 3, 75-87.10.1016/j.tcs.2012.06.001Search in Google Scholar

18. Carbone, A. R., L. Compagna, J. Gincarlo, Sorniotti. An Authenication Flaw in Browser Based Single Sign on Protocols: Impact and Remediations. - Journal of Computers and Security, Vol. 33, 2012, 41-58.10.1016/j.cose.2012.08.007Search in Google Scholar

19. Bielova, N. Survey on Java Script Security Policies and Their Enforcement Mechanisms in a Web Browser. - Journal of Logic and Algebraic Programming, Available Online from May 2013.10.1016/j.jlap.2013.05.001Search in Google Scholar

20. Xiang, Y., X. Shi, J. Wu, Z. Wang, X. Yin. Sign What You Really Care about Secure BGP AS-Paths Efficiently. - Journal of Computer Networks, Vol. 57, 2013, No 10, 2250-2265.10.1016/j.comnet.2012.11.019Search in Google Scholar

21. Dokev, N., I.Blagoev. An Approach for Automatic Transmission of Authenticated Data over Computer Networks. - Cybernetics and Information Technologies, Vol. 11, 2011, No 2, 65-82.Search in Google Scholar

22. Pencheva, E., I. Atanasov. Open Access to Call and Session Control in Mobile Networks. - Cybernetics and Information Technologies, Vol. 10, 2010, No 1, 49-63. Search in Google Scholar

eISSN:
1314-4081
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Informationstechnik