{"id":"https://openalex.org/W3089946247","doi":"https://doi.org/10.1109/wts48268.2020.9198717","title":"Preventing Session Hijacking using Encrypted One-Time-Cookies","display_name":"Preventing Session Hijacking using Encrypted One-Time-Cookies","publication_year":2020,"publication_date":"2020-04-01","ids":{"openalex":"https://openalex.org/W3089946247","doi":"https://doi.org/10.1109/wts48268.2020.9198717","mag":"3089946247"},"language":"en","primary_location":{"id":"doi:10.1109/wts48268.2020.9198717","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wts48268.2020.9198717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Wireless Telecommunications Symposium (WTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045279787","display_name":"Renascence Tarafder Prapty","orcid":null},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Renascence Tarafder Prapty","raw_affiliation_strings":["Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097217496","display_name":"Shuhana Azmin","orcid":null},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Shuhana Azmin Md","raw_affiliation_strings":["Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069844849","display_name":"Md. Shohrab Hossain","orcid":"https://orcid.org/0000-0002-4612-6771"},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Shohrab Hossain","raw_affiliation_strings":["Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005801366","display_name":"Husnu S. Narman","orcid":"https://orcid.org/0000-0003-0788-6265"},"institutions":[{"id":"https://openalex.org/I88694374","display_name":"Marshall University","ror":"https://ror.org/02erqft81","country_code":"US","type":"education","lineage":["https://openalex.org/I88694374"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Husnu S. Narman","raw_affiliation_strings":["Weisberg Division of Computer Science, Marshall University, Huntington, WV, USA"],"affiliations":[{"raw_affiliation_string":"Weisberg Division of Computer Science, Marshall University, Huntington, WV, USA","institution_ids":["https://openalex.org/I88694374"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5045279787"],"corresponding_institution_ids":["https://openalex.org/I183697816"],"apc_list":null,"apc_paid":null,"fwci":2.498,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.91708493,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8217248916625977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6861686110496521},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.6727943420410156},{"id":"https://openalex.org/keywords/stateless-protocol","display_name":"Stateless protocol","score":0.6441201567649841},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5948758125305176},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.5893011689186096},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5017204284667969},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.4941754639148712},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4328002333641052},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.3650584816932678},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34179872274398804},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22303149104118347}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8217248916625977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6861686110496521},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.6727943420410156},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.6441201567649841},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5948758125305176},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.5893011689186096},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5017204284667969},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.4941754639148712},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4328002333641052},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3650584816932678},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34179872274398804},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22303149104118347},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wts48268.2020.9198717","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wts48268.2020.9198717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Wireless Telecommunications Symposium (WTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1488626061","https://openalex.org/W1588094464","https://openalex.org/W1605786385","https://openalex.org/W1966864893","https://openalex.org/W1996474511","https://openalex.org/W2001113572","https://openalex.org/W2097707717","https://openalex.org/W2099035338","https://openalex.org/W2592562974","https://openalex.org/W2765425060","https://openalex.org/W2897005587","https://openalex.org/W2900666222","https://openalex.org/W6629055722","https://openalex.org/W6755747931"],"related_works":["https://openalex.org/W2035312053","https://openalex.org/W2908539414","https://openalex.org/W112987992","https://openalex.org/W4246017188","https://openalex.org/W17249245","https://openalex.org/W2234619324","https://openalex.org/W4298846198","https://openalex.org/W358240276","https://openalex.org/W2398270998","https://openalex.org/W2744220011"],"abstract_inverted_index":{"Hypertext":[0],"Transfer":[1],"Protocol":[2],"(HTTP)":[3],"cookies":[4,88],"are":[5,32],"pieces":[6],"of":[7,62],"information":[8,18,106],"shared":[9],"between":[10],"HTTP":[11,22],"server":[12],"and":[13,42,78,100,121,138],"client":[14],"to":[15,25,38,52,89],"remember":[16],"stateful":[17],"for":[19],"the":[20,108],"stateless":[21],"protocol":[23],"or":[24],"record":[26],"a":[27,40,48,64,76],"user's":[28,56],"browsing":[29],"activity.":[30],"Cookies":[31],"often":[33],"used":[34,85],"in":[35,107],"web":[36],"applications":[37],"identify":[39],"user":[41],"corresponding":[43],"authenticated":[44,55],"session.":[45,57],"Thus,":[46],"stealing":[47],"cookie":[49,65,80,94,98,139],"can":[50,117,129],"lead":[51],"hijacking":[53,133],"an":[54],"To":[58,96],"prevent":[59,90,131],"this":[60,71],"type":[61],"attack,":[63],"protection":[66,81],"mechanism":[67],"is":[68],"required.":[69],"In":[70],"paper,":[72],"we":[73,102],"have":[74,84,103,111],"proposed":[75,115,127],"secure":[77],"efficient":[79],"system.":[82],"We":[83,110],"one":[86],"time":[87],"attacker":[91],"from":[92],"performing":[93],"injection.":[95],"ensure":[97,118],"integrity":[99,122],"confidentiality,":[101,119],"encrypted":[104],"sensitive":[105],"cookie.":[109],"verified":[112],"that":[113],"our":[114],"system":[116,128],"authenticity":[120],"through":[123,135],"security":[124],"analysis.":[125],"Our":[126],"efficiently":[130],"session":[132],"performed":[134],"replay":[136],"attack":[137],"poisoning":[140],"attack.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-04T09:10:02.777135","created_date":"2025-10-10T00:00:00"}
