Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
ISBN:
9780791859919
No. of Pages:
2000
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
237 Research on AJAX Forms Authentication Technology under the Environment of PHP
By
Sheng-Ju Yang
,
Sheng-Ju Yang
Gansu Institute of Science & Technology Information
, Gansu, Lanzhou, 730000
, China
; yangshengju@cssci.info
Search for other works by this author on:
Shao-Ting Shi
,
Shao-Ting Shi
Gansu Institute of Science & Technology Information
, Gansu, Lanzhou, 730000
, China
Search for other works by this author on:
Xin-Hui Zhao
Xin-Hui Zhao
Gansu Institute of Science & Technology Information
, Gansu, Lanzhou, 730000
, China
Search for other works by this author on:
Page Count:
5
-
Published:2011
Citation
Yang, S, Shi, S, & Zhao, X. "Research on AJAX Forms Authentication Technology under the Environment of PHP." International Conference on Computer Technology and Development, 3rd (ICCTD 2011). Ed. Zhou, J. ASME Press, 2011.
Download citation file:
In this paper, the authors put forward a method to build the forms authentication technology which is more friendly and quicker in responses by using the AJAX technology to authenticate forms under the environment of PHP, which is aimed at solving the problem of the traditional WEB form authentication being limited by HTTP and users waiting for a long time. Also, the authors give a detailed introduction to the rules of the AJAX form authentication, authentication principle and show the details of authenticating, ways of implementation and its partial codes.
Abstract
Key Words
0. Introduction
1. Web Forms Authentication
2. Key Technologies
3. Principle of AJAX Forms Authentication
4. Implementation of the AJAX Forms Authentication
5. Conclusion
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Software Development Life Cycle (SDLC) Based Method to Test Security of the Ajax-Enabled Rich Internet Applications
International Conference on Mechanical and Electrical Technology, 3rd, (ICMET-China 2011), Volumes 1–3
The Method of .Net Foreground Js Invoking Backestage C#
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
A Systematic Defense Model for Complex Network Based on Authentication
International Conference on Measurement and Control Engineering 2nd (ICMCE 2011)
An Analysis of Eye Movement Based Authentication Systems
International Conference on Mechanical Engineering and Technology (ICMET-London 2011)
Related Articles
Signature Authentication by Forensic Document Examiners
J. Forensic Sci. (July,2001)
Enhance Engineering Design Education in the Middle Years With Authentic Engineering Problems
J. Mech. Des (December,2018)
2-DWT and AES: Secure Authentication Management for Polar Iris Templates Using Visual Cryptography
J. Test. Eval. (March,2017)