Single Sign-On 솔루션의 재전송 공격 취약점 분석
Vol. 18, No. 1, pp. 103-114,
2월.
2008
10.13089/JKIISC.2008.18.1.103, Full Text:
Keywords: Single Sign-On, Cookie, Session, Replay Attack, Hypertext Transfer Protocol
Abstract Statistics
Cite this article
10.13089/JKIISC.2008.18.1.103, Full Text:
Keywords: Single Sign-On, Cookie, Session, Replay Attack, Hypertext Transfer Protocol
Abstract Statistics
Cite this article
[IEEE Style]
Y. Maeng and D. Nyang, "An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions," Journal of The Korea Institute of Information Security and Cryptology, vol. 18, no. 1, pp. 103-114, 2008. DOI: 10.13089/JKIISC.2008.18.1.103.
[ACM Style]
Young-Jae Maeng and Dae-Hun Nyang. 2008. An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions. Journal of The Korea Institute of Information Security and Cryptology, 18, 1, (2008), 103-114. DOI: 10.13089/JKIISC.2008.18.1.103.