Session fixation

Known as: Session fixiation 
In computer network security, session fixation attacks attempt to exploit the vulnerability of a system which allows one person to fixate (find or… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2002-2017
02420022017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Web applications use authentication mechanisms to provide user-friendly content to users. However, some dangerous techniques like… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
By now, Internet has attained supremacy over physical mediums to access data related to banking, healthcare, and other critical… (More)
Is this relevant?
2012
2012
The web is the most wide-spread and de facto distributed platform, with a plethora of valuable applications and services… (More)
  • figure 1
  • figure 2
Is this relevant?
2012
2012
A.P. Jadhav Professor, Dept of Computer Science & Engineering, JDIET-Yavatmal, MH-India. Namita V. Uike Final year B.E student… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
After the initial login, web browsers authenticate to web applications by sending the session credentials with every request… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
Many web applications employ session management to keep track of visitors' activities across pages and over periods of time. A… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table I
Is this relevant?
2011
2011
The term 'Session Fixation vulnerability' subsumes issues in Web applications that under certain circumstances enable the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2010
2010
The term ‘Session Fixation vulnerability’ subsumes issues inWeb applications that under certain circumstances enable the… (More)
Is this relevant?
2010
2010
Session fixation is a technique for obtaining the visitor's session identifier (SID) by forcing the visitor to use the SID… (More)
  • figure 1
  • figure 2
Is this relevant?
2002
2002
Many web-based applications employ some kind of session management to create a user-friendly environment. Sessions are stored on… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?