Login / Signup

Investigation of the Broken Authentication Vulnerability in Web Applications.

Yuriy LakhElena NyemkovaAndrian PiskozubViktor Yanishevskyi
Published in: IDAACS (2021)
Keyphrases
  • web applications
  • application development
  • web services
  • end users
  • application developers
  • web browser
  • flow diagram
  • business applications
  • dynamic content
  • database
  • security vulnerabilities