<--- Back to Details
First PageDocument Content
Business / Forgery / Counterfeit consumer goods / Crime / Pharmaceuticals policy / Misconduct / Counterfeit / Brand piracy / UGG / Pharmaceutical industry in China / Banknote / Organized crime
Date: 2013-07-17 07:25:38
Business
Forgery
Counterfeit consumer goods
Crime
Pharmaceuticals policy
Misconduct
Counterfeit
Brand piracy
UGG
Pharmaceutical industry in China
Banknote
Organized crime

Business strategies in the counterfeit market

Add to Reading List

Source URL: cocoa.ethz.ch

Download Document from Source Website

File Size: 136,48 KB

Share Document on Facebook

Similar Documents

Cryptography / Emerging technologies / Quantum computing / Theoretical computer science / Data Encryption Standard / Applied mathematics / Block cipher / Key size / Quantum algorithm / RSA / Public-key cryptography

Introduction Forgery attack against CBC-MAC Modes of operations

DocID: 1xViB - View Document

Cryptography / Applied mathematics / Differential cryptanalysis / Data Encryption Standard / Block cipher / Truncated differential cryptanalysis / ICE / Cryptanalysis / Statistical hypothesis testing / Rebound attack / Differential-linear attack

Differential Forgery Attack against LAC Ga¨etan Leurent Inria, France Abstract. LAC is one of the candidates to the CAESAR competition.

DocID: 1xUYK - View Document

Cryptography / Block cipher modes of operation / Block cipher / Chosen-plaintext attack / Authenticated encryption / Cryptanalysis / Galois/Counter Mode / Chosen-ciphertext attack / Advanced Encryption Standard / OCB mode / Data Encryption Standard / Book:Cryptography 1

Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

DocID: 1xTVn - View Document

Computing / World Wide Web / Software engineering / Internet privacy / Cross-site request forgery / Computer network security / Hacking / Ajax / Same-origin policy / Cross-site scripting / HTTP cookie / Referer spoofing

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

DocID: 1xTKA - View Document

Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong, Mathias Payer*, Reza Moazzezi, Mario Frank,

DocID: 1vmu2 - View Document