Login / Signup
Security flaws of remote user access over insecure networks.
Kyung-Ah Shim
Published in:
Comput. Commun. (2006)
Keyphrases
</>
user access
security flaws
authentication scheme
user access patterns
database
website
social networks
web logs
web users
information retrieval
web services
authentication protocol