Jalal et al., 2008 - Google Patents
Security enhancement for e-learning portalJalal et al., 2008
View PDF- Document ID
- 520373800666537620
- Author
- Jalal A
- Zeb M
- Publication year
- Publication venue
- International Journal of Computer Science and Network Security
External Links
Snippet
This paper describes the security feature of e-learning authentication. The main goal of this research is to achieve authentication to identify legal user. Internet is open for all users to access and share information. Simultaneously, the user hackers are also their, to examine a …
- 238000000034 method 0 abstract description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jalal et al. | Security enhancement for e-learning portal | |
Akhawe et al. | Towards a formal foundation of web security | |
Stuttard et al. | The web application hacker's handbook: Finding and exploiting security flaws | |
Luminita | Information security in E-learning Platforms | |
Atashzar et al. | A survey on web application vulnerabilities and countermeasures | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Banoth et al. | Implementation and mitigation for cyber attacks with proposed OCR process model. | |
Slaughter et al. | Information security plan for flight simulator applications | |
De Ryck et al. | Primer on client-side web security | |
Jagannath et al. | Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures | |
Lepofsky | The manager's guide to web application security: a concise guide to the weaker side of the web | |
Odirichukwu et al. | Security concept in web database development and administration—A review perspective | |
Deshpande et al. | Major web application threats for data privacy & security–detection, analysis and mitigation strategies | |
Mayer et al. | Guardians of the clouds: When identity providers fail | |
Derawi | Securing e-learning platforms | |
Krasniqi et al. | Vulnerability Assessment & Penetration Testing: Case study on web application security | |
Lim et al. | A study on applying software security to information systems: e-learning portals | |
Torsteinbø | Data loss prevention systems and their weaknesses | |
Abou Elsaad | A formal methods analysis of the session binding proxy protocol | |
De Ryck | Client-side web security: mitigating threats against web sessions | |
Wu | Authentication in Web Applications | |
Bhat | Analysis of Cybersecurity for the Enterprise | |
Gold | The cookie monster | |
Alabdulrazzaq | Securing Web Applications: Web Application Flow Whitelisting to Improve Security | |
Sahu | Web Security for PHP Applications |