Applied Cryptography and Network Security
From MaRDI portal
Publication:4680948
DOI10.1007/B98360zbMATH Open1103.68509OpenAlexW4301861138MaRDI QIDQ4680948FDOQ4680948
Authors: Stephen W. Boyd, Angelos D. Keromytis
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (8)
- Defining code-injection attacks
- The essence of command injection attacks in web applications
- A novel method for SQL injection attack detection based on removing SQL query attribute values
- Preventing injection attacks with syntax embeddings
- Simple and safe SQL queries with \texttt{C++} templates
- Protecting cookies against cross-site scripting attacks using cryptography
- Simple linear string constraints
- A survey on server-side approaches to securing web applications
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680948)