Cristian Contasel, Dumitru-Cristian Tranca, A. Pălăcean
{"title":"通过使用智能手机提高web应用程序的安全性","authors":"Cristian Contasel, Dumitru-Cristian Tranca, A. Pălăcean","doi":"10.1109/roedunet57163.2022.9921098","DOIUrl":null,"url":null,"abstract":"The web applications security systems often use the authentication strategy and credentials to assess the identity of the user. Based on the credentials, the system is able to claim the identity of the user. Also, the authenticity of identity is claimed based on authentication strategy. This paper analyzes and compares different strategies used to enforce the web applications security systems by using location and biometric features of the smartphones to provide two-way authentications.","PeriodicalId":302692,"journal":{"name":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Increasing the security of web applications by using smartphones\",\"authors\":\"Cristian Contasel, Dumitru-Cristian Tranca, A. Pălăcean\",\"doi\":\"10.1109/roedunet57163.2022.9921098\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The web applications security systems often use the authentication strategy and credentials to assess the identity of the user. Based on the credentials, the system is able to claim the identity of the user. Also, the authenticity of identity is claimed based on authentication strategy. This paper analyzes and compares different strategies used to enforce the web applications security systems by using location and biometric features of the smartphones to provide two-way authentications.\",\"PeriodicalId\":302692,\"journal\":{\"name\":\"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/roedunet57163.2022.9921098\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 21st RoEduNet Conference: Networking in Education and Research (RoEduNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/roedunet57163.2022.9921098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Increasing the security of web applications by using smartphones
The web applications security systems often use the authentication strategy and credentials to assess the identity of the user. Based on the credentials, the system is able to claim the identity of the user. Also, the authenticity of identity is claimed based on authentication strategy. This paper analyzes and compares different strategies used to enforce the web applications security systems by using location and biometric features of the smartphones to provide two-way authentications.