Forgery

Results: 1137



#Item
221Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC

Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC⋆ Zheng Yuan1,2 , Keting Jia3 , Wei Wang3 , and Xiaoyun Wang⋆⋆2,3 1 Beijing Electronic Science and Technology Institute, Beijing 1000

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-12 10:35:54
222Uniform resource locator / Cross-site scripting / HTTP cookie / JavaScript / Form / HTTP referer / Web server / Cross-site request forgery / Code injection / Computing / World Wide Web / Cyberwarfare

Advanced Cross Site Scripting by Gavin Zuchlinski http://libox.net Table of Contents

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2003-10-20 16:21:38
223Data / Prepared statement / SQL injection / Cross-site request forgery / Update / HTTP cookie / From / Code injection / Data management / Computing / SQL

PHP Security Pitfalls By: Ilia Alshanetsky 1 Let Google be our guide!

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2007-05-17 18:38:24
224Crime / Consumer Product Safety Improvement Act / Business / Beanie Baby / Deception / Counterfeit medications / Counterfeit consumer goods / Counterfeit / Forgery

Danger of Counterfeits and How to Spot Them: Rainbow Loom® (US Patent 8,485,565 and international patents pending) is tested to comply with ASTM and CPSIA toy safety standards by US-accredited labs.

Add to Reading List

Source URL: www.rainbowloomeurope.com

Language: English - Date: 2014-09-29 05:35:57
225Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-02 17:52:59
226Tesa / Computer security / Crime / Public safety / Security / Counterfeit / Forgery

We make the difference Innovative solutions for product and brand protection A tesa company »Our brand will only stay successful

Add to Reading List

Source URL: www.tesa-scribos.com

Language: English - Date: 2015-05-26 05:47:56
227Tesa / Computer security / Crime / Public safety / Security / Counterfeit / Forgery

We make the difference Innovative solutions for product and brand protection A tesa company »Our brand will only stay successful

Add to Reading List

Source URL: www.tesa-scribos.com

Language: English - Date: 2015-05-26 05:42:41
228United Kingdom / Communist Party of Great Britain / Conservative Party / Political forgery / Zinoviev letter / Ramsay MacDonald / Worksheet / Propaganda / Question / Politics of the United Kingdom / Government of the United Kingdom / Labour Party

Comprehension 1a This is a difficult source because: It comes from 1924 It is full of political ideas It was translated from Russian. So this question is answered in a different way.

Add to Reading List

Source URL: www.nationalarchives.gov.uk

Language: English - Date: 2003-11-10 06:39:59
229Computer security / HTTP / HTTP cookie / Internet privacy / Clickjacking / Cookiejacking / Cross-site request forgery / Hacking / Computing / Social engineering

Cookiejacking Rosario Valotta Agenda !   Me, myself and I !   The IE security zones

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-28 00:11:29
230Pericles / Greece / Political philosophy / Europe / Counterfeit / Forgery / European Union

PDF Document

Add to Reading List

Source URL: eeas.europa.eu

Language: English - Date: 2014-04-11 05:51:55
UPDATE