2014 International Conference on Computer and Communication Technology (ICCCT) 2014
DOI: 10.1109/iccct.2014.7001497
|View full text |Cite
|
Sign up to set email alerts
|

Mobile agent based architecture to prevent session hijacking attacks in IEEE 802.11 WLAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Park et al [3] suggested cryptographic cookie mechanisms that provide better confidentiality and integrity to web session. S.Jha and S.Ali in [5] they have use Tokens generation, session encryption and use of unique session ID but the disadvantage is Computation overhead. Spoofing and De authentication can still occur.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…Park et al [3] suggested cryptographic cookie mechanisms that provide better confidentiality and integrity to web session. S.Jha and S.Ali in [5] they have use Tokens generation, session encryption and use of unique session ID but the disadvantage is Computation overhead. Spoofing and De authentication can still occur.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…This section presents various suggestions and different related techniques to protect transferred data. Jha et al, (2014) suggest Quantum cryptography that "provides safety and security for network communication by performing cryptographic tasks using quantum mechanical effects. " Fallah & Alnuweiri (2007), introduce public-key cryptography to "secure wireless network security which has been usually considered as nearly impossible."…”
Section: Introductionmentioning
confidence: 99%