Forgery

Results: 1137



#Item
91Computing / Software / Hypertext Transfer Protocol / Internet privacy / Cryptographic protocols / Secure communication / Cross-site request forgery / Computer access control / HTTP cookie / Same-origin policy / Basic access authentication / JavaScript

Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington Alexander Moshchuk

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
92Security / Computing / Prevention / Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: www.security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
93Computing / Software / World Wide Web / Internet privacy / Computer access control / Hypertext Transfer Protocol / HTTP cookie / Login / Cross-site request forgery / Cookie Monster / Session / Facebook

FINAL REPORTCookie Analysis

Add to Reading List

Source URL: fbcdn-dragon-a.akamaihd.net

Language: English - Date: 2013-07-09 14:28:00
94

FORGERY AFFIDAVIT STATE OF TEXAS § COUNTY OF LUBBOCK

Add to Reading List

Source URL: www.texastechfcu.org

Language: English - Date: 2016-02-10 14:29:36
    95Computer security / Cyberwarfare / Cryptography / Security / Password / Key management / Cross-site request forgery / Crypt / Passwd / SQL injection / Cross-site scripting / Code injection

    Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863 whois: Ilia Alshanetsky

    Add to Reading List

    Source URL: ilia.ws

    Language: English - Date: 2015-09-26 04:23:31
    96

    Increased DNS Forgery Resistance Through 0x20-Bit Encoding SecURItY viA LeET QueRieS David Dagon Manos Antonakakis

    Add to Reading List

    Source URL: astrolavos.gatech.edu

    Language: English - Date: 2016-01-27 10:57:12
      97

      Am Ch Artru Stardust Am Ch Candelle’s Cinnamon Toast Can Ch Larmaro’s Ashley Of Candelle Am Ch Soldier of Fortune Am Ch Frandee’s Forgery Am Ch Silverhall Snapdragon

      Add to Reading List

      Source URL: barry-hazel.tripod.com

      - Date: 2008-08-17 10:54:12
        98Computing / Software engineering / Magic quotes / Eval / Cross-site request forgery / This / Software

        Securing PHP Survey of the solutions Stanislav Malyshev Most code is extremely buggy…

        Add to Reading List

        Source URL: w2spconf.com

        Language: English - Date: 2012-02-07 16:10:03
        99Computer access control / Computer security / Cryptography / Security / One-time password / Google Authenticator / Sina Weibo / Cross-site request forgery / Authentication / Short Message Service / Multi-factor authentication

        Security report for Peatio exchange Peatio is an open source Bitcoin exchange: https://github.com/peatio/peatio    Hijacking the account

        Add to Reading List

        Source URL: sakurity.com

        Language: English - Date: 2016-01-11 15:40:03
        100

        IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 4, DECEMBERDetecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions

        Add to Reading List

        Source URL: www.hci.iis.u-tokyo.ac.jp

        Language: English - Date: 2010-12-07 02:32:52
          UPDATE