Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions.
Marcus NiemietzMario KorthChristian MainkaJuraj SomorovskyPublished in: CoRR (2021)
Keyphrases
- security analysis
- smart card
- public key
- high security
- security properties
- security requirements
- security model
- image encryption
- source code
- encryption scheme
- authentication protocol
- software systems
- encryption algorithm
- user authentication
- easy to follow
- mutual authentication
- authentication scheme
- private key
- multiresolution
- database systems