Login / Signup

Security flaws of remote user access over insecure networks.

Kyung-Ah Shim
Published in: Comput. Commun. (2006)
Keyphrases
  • user access
  • security flaws
  • authentication scheme
  • user access patterns
  • database
  • website
  • social networks
  • web logs
  • web users
  • information retrieval
  • web services
  • authentication protocol