Web ilovalarda foydalanuvchilarning autentifikatsion ma’lumotlarini himoyalash usullari
Foydalanilgan adabiyotlar ro‘yxati
Download 165.91 Kb. Pdf ko'rish
|
1 2
Foydalanilgan adabiyotlar ro‘yxati:
1. Stefan Kartunov, Petar Milić, Kristijan Kuk, Uroš Dinić “Protection of user credentials in web application” VOL 10 NO / (2020): THEMATIC CONFERENCE PROCEEDINGS OF INTERNATIONAL SIGNIFICANCE 2. E. Adi, “A design of a proxy inspired from human immune system to detect SQL injection and cross-site scripting,” Procedia Engineering, vol. 50, pp. 19– 28, 2012 3. J. Grossman, XSS Attacks: Cross-site scripting exploits and defense, Syngress, 2007. 4. Zonenberg, A. (2009). Distributed Hash Cracker: A Cross-Platform GPU Accelerated Password Recovery System.New York, USA: Rensselaer Polytechnic Institute. 5. Wen Chai, C. (2018). Secure login authentication system.Universiti Tunku Abdul Rahman. 6. Wang, D., He, D., Wang, P., & Chu, C.-H. (2014). Anonymous Two-Factor Authentication in DistributedSystems: Certain Goals Are Beyond Attainment. IEEE Transactions on Dependable and Secure Computing, 12 (4), 428 - 442. 7. Anis, A. (2018). Securing web applications with secure coding practices and integrity verification. Ontario, Canada: Queen’s University. 8. Ristić, N., Jevremović, A., & Veinović, M. (2013). System of segment protection of user data in the web applications. In Proceedings of the XII International Conference “INFOTEH”.12, pp. 915 - 918. Jahorina, BiH: IEEE. Download 165.91 Kb. Do'stlaringiz bilan baham: |
1 2
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling