[1. Alex, Chin Huang, Mohamed. A Secure Cookie Protocol. - In: Proc. of IEEE Conference on Network Security, 2007, 333-338.]Search in Google Scholar
[2. Chomsiri. HTTPS Hacking Protection. - In: Proc. of IEEE International Conference on Advanced Information Networking and Applications, 2007, 42-47.10.1109/AINAW.2007.200]Search in Google Scholar
[3. Miyazaki, A. D. Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage. - American Marketing Association, Vol. 27, 2008, No 1, 19-33.10.1509/jppm.27.1.19]Search in Google Scholar
[4. Adida, B. Session Lock: Securing Web Sessions Against Eavesdropping. - In: Proc. of International Conference on Web Client Security, China, 2008, 517-524.]Search in Google Scholar
[5. Jackson, C., A. Barth. Force HTTPS: Protecting High Security Websites from Network Attacks. - In: Proc. of International Conference on Web Client Security, China, 2008, 536-552.]Search in Google Scholar
[6. Juels, A., T. Markus. Cache Cookies for Browser Authentication. - In: Proc. of IEEE International Conference on Security and Privacy, 2008.]Search in Google Scholar
[7. Christopher, Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities. - In: Proc. of IEEE International Conference on Security, 2009.]Search in Google Scholar
[8. Howard, M. Man-in-the Middle Attack to the HTTPS Protocol. - In: Proc. of IEEE Securiry and Privacy, 2009, 78-81.10.1109/MSP.2009.12]Search in Google Scholar
[9. Gaw, S., E. W. Felten. Password Management Strategies for Online Accounts. - In: Proc. of International Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, USA, 2006, 44-55.10.1145/1143120.1143127]Search in Google Scholar
[10. Ritchie, P. The Security Risks of AJAX / Web 2.0 Applications. Network Security, Secure Test, Ltd., UK, 2007.10.1016/S1353-4858(07)70025-9]Search in Google Scholar
[11. Barth, A., C. Jackson, J. Mitchell. Robust Defenses for Cross Sire Request Forgery. - In: Proc. of ACM International Conference on CCS’08, Virginia, USA, 2008, 75-87.10.1145/1455770.1455782]Search in Google Scholar
[12. Adida, B. Session Lock:Securing Web Sessions Against Eavesdropping. - In: Proc. of International World Wide Web Conference Committee (IW3C2), ACM, Beijing, China, 2008, 517-524.]Search in Google Scholar
[13. Wang, F., Y. Zhang. A New Provably Secure Authentication and Key Agreement Mechanisms for SIP Using Certificate Less Public Key Cryptography. 2008, 1-15.10.1109/CIS.2007.113]Search in Google Scholar
[14. Perdisci, R., D. Ariu, P. Giacinto, W. Lee. McPAD: A Multiple Classifier System for Accurate Payload Based Anomaly Detection. - Journal of Computer Networks, Vol. 53, 2009, No 6, 864-881.10.1016/j.comnet.2008.11.011]Search in Google Scholar
[15. Eisen, O. Catching the Fraudlent Man-in-the-Middle and Main-in-the-Browser. - Network Security, 2010, No 4, 11-12.10.1016/S1353-4858(10)70046-5]Search in Google Scholar
[16. Liao, Yi-Pin, S. S. Wang. A New Secure Password Authenticated Key Agreement Scheme for SIP Using Self Certified Public Keys on Elliptic Curves. - Journal of Computer Communications, Vol. 33, 2010, No 3, 372-380.10.1016/j.comcom.2009.10.005]Search in Google Scholar
[17. Cichon, J., Z. Golebiewski, M. Kutylowski. From Key Pre-Distribution to Key Redistribution. - Journal of Theoretical Computer Science, Vol. 45, 2012, No 3, 75-87.10.1016/j.tcs.2012.06.001]Search in Google Scholar
[18. Carbone, A. R., L. Compagna, J. Gincarlo, Sorniotti. An Authenication Flaw in Browser Based Single Sign on Protocols: Impact and Remediations. - Journal of Computers and Security, Vol. 33, 2012, 41-58.10.1016/j.cose.2012.08.007]Search in Google Scholar
[19. Bielova, N. Survey on Java Script Security Policies and Their Enforcement Mechanisms in a Web Browser. - Journal of Logic and Algebraic Programming, Available Online from May 2013.10.1016/j.jlap.2013.05.001]Search in Google Scholar
[20. Xiang, Y., X. Shi, J. Wu, Z. Wang, X. Yin. Sign What You Really Care about Secure BGP AS-Paths Efficiently. - Journal of Computer Networks, Vol. 57, 2013, No 10, 2250-2265.10.1016/j.comnet.2012.11.019]Search in Google Scholar
[21. Dokev, N., I.Blagoev. An Approach for Automatic Transmission of Authenticated Data over Computer Networks. - Cybernetics and Information Technologies, Vol. 11, 2011, No 2, 65-82.]Search in Google Scholar
[22. Pencheva, E., I. Atanasov. Open Access to Call and Session Control in Mobile Networks. - Cybernetics and Information Technologies, Vol. 10, 2010, No 1, 49-63. ]Search in Google Scholar