Authentication in mobile cloud computing: A survey

M Alizadeh, S Abolfazli, M Zamani, S Baharun… - Journal of Network and …, 2016 - Elsevier
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …

Phishing counter measures and their effectiveness–literature review

S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …

Authentication systems: A literature review and classification

MH Barkadehi, M Nilashi, O Ibrahim, AZ Fardi… - Telematics and …, 2018 - Elsevier
One of the most important parts of any system is authentication. Appreciated as the first and
the last line of defense in the great majority of cases, authentication systems can usually …

When HTTPS meets CDN: A case of authentication in delegated service

J Liang, J Jiang, H Duan, K Li, T Wan… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
Content Delivery Network (CDN) and Hypertext Transfer Protocol Secure (HTTPS) are two
popular but independent web technologies, each of which has been well studied …

An operational semantics for JavaScript

S Maffeis, JC Mitchell, A Taly - … and Systems: 6th Asian Symposium, APLAS …, 2008 - Springer
We define a small-step operational semantics for the ECMAScript standard language
corresponding to JavaScript, as a basis for analyzing security properties of web applications …

One-time cookies: Preventing session hijacking attacks with stateless authentication tokens

I Dacosta, S Chakradeo, M Ahamad… - ACM Transactions on …, 2012 - dl.acm.org
HTTP cookies are the de facto mechanism for session authentication in Web applications.
However, their inherent security weaknesses allow attacks against the integrity of Web …

BogusBiter: A transparent protection against phishing attacks

C Yue, H Wang - ACM Transactions on Internet Technology (TOIT), 2010 - dl.acm.org
Many anti-phishing mechanisms currently focus on helping users verify whether a Web site
is genuine. However, usability studies have demonstrated that prevention-based …

Using one-time passwords to prevent password phishing attacks

CY Huang, SP Ma, KT Chen - Journal of Network and Computer …, 2011 - Elsevier
Phishing is now a serious threat to the security of Internet users' confidential information.
Basically, an attacker (phisher) tricks people into divulging sensitive information by sending …

Guessing human-chosen secrets

J Bonneau - 2012 - cl.cam.ac.uk
Authenticating humans to computers remains a notable weak point in computer security
despite decades of effort. Although the security research community has explored dozens of …

Sauth: Protecting user accounts from password database leaks

G Kontaxis, E Athanasopoulos, G Portokalidis… - Proceedings of the …, 2013 - dl.acm.org
Password-based authentication is the dominant form of access control in web services.
Unfortunately, it proves to be more and more inadequate every year. Even if users choose …