Wireless sensor technologies, especially Wireless Body Sensor Network (WBSN) or Wireless Body Area Sensor Network (WBASN), have gone beyond the fine-grained …
In this paper, we focus on authentication and authorization flaws in web apps that enable partial or full access to user accounts. Specifically, we develop a novel fully automated black …
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they are exposed to a variety of attacks. The biggest challenge facing organizations is how to …
S Hong - Peer-to-Peer Networking and Applications, 2020 - Springer
Sensor nodes play a major role in IoT environment, and each sensor is a peer to peer networking. Due to limited physical size, IoT sensor nodes must have light-weight …
Now in its Third Edition, this completely revised and updated reference provides a thorough and comprehensive introduction into the SSL, TLS, and DTLS protocols, explaining all the …
I Dacosta, S Chakradeo, M Ahamad… - ACM Transactions on …, 2012 - dl.acm.org
HTTP cookies are the de facto mechanism for session authentication in Web applications. However, their inherent security weaknesses allow attacks against the integrity of Web …
T Unger, M Mulazzani, D Frühwirt… - 2013 International …, 2013 - ieeexplore.ieee.org
Session hijacking has become a major problem in today's Web services, especially with the availability of free off-the-shelf tools. As major websites like Facebook, You tube and Yahoo …
X Li, MA Salehi, M Bayoumi… - 2016 16th IEEE/ACM …, 2016 - ieeexplore.ieee.org
Video streams, either in form of on-demand streaming or live streaming, usually have to be converted (ie, transcoded) based on the characteristics of clients' devices (eg, spatial …
OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID- enabled user accounts, and tens of thousands of supporting websites. While the security of …