Forgery

Results: 1137



#Item
21Cryptography / Error detection and correction / E-commerce / RSA / Digital signature forgery / Digital signature / EMV / Optimal asymmetric encryption padding / Hamming weight / Hash function / Byte

Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-10 09:46:08
22Economy / International trade / Forgery / Intellectual property law / Design / Innovation / Intellectual property / Counterfeit consumer goods / Counterfeit / Trans-Pacific Partnership / Economy of China / Business

2016 Policy Priorities TRADE – Expand Access to Global Markets • • •

Add to Reading List

Source URL: www.semiconductors.org

Language: English - Date: 2016-05-27 22:13:01
23Cryptography / Watermarking / Digital watermarking / Banknotes / Money forgery / Stationery / Watermark / Access control / Audio watermark / Digital rights management / Cinavia

Side-Channel Watermarks for Embedded Software Georg T. Becker ∗ , Wayne Burleson∗ , Christof Paar∗† , ∗ University of Massachusetts Amherst, USA † Horst G¨ ortz Institute for IT Security Ruhr University Boch

Add to Reading List

Source URL: vcsg.ecs.umass.edu

Language: English - Date: 2011-05-10 15:38:52
24Quality / Business / Value ethics) / Forgery / Evaluation / Counterfeit electronic components / Authentication / Counterfeit consumer goods / Counterfeit / Quality assurance / United States Military Standard / ISO

Essential Quality Control Strategies for Combatting Counterfeit Components Counterfeit electronic components remains the primary threat to the supply chain,

Add to Reading List

Source URL: www.harrykrantz.com

Language: English - Date: 2013-05-21 11:28:48
25Computing / Cyberwarfare / Computer security / Computer network security / Cross-site scripting / Hacking / Cross-site request forgery / JavaScript / SQL injection / Application security / Web application firewall

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
26Banknotes / Paper / Economy / Money forgery / Money / Philatelic fakes and forgeries / Counterfeit money / Euro banknotes / Bangladeshi taka / Watermark

Forensic Science International–258 Contents lists available at ScienceDirect Forensic Science International journal homepage: www.elsevier.com/locate/forsciint

Add to Reading List

Source URL: www.siltanen-research.net

Language: English - Date: 2016-04-12 07:10:10
27Business / Forgery / Economy / Professional studies / Counterfeit electronic components / Distribution / Prison Break / Counterfeit / Supply chain / The Company

July 27th, 2015 Remarks on DOJ Public Announcement Why is this the first time we are hearing about this? Because of the sensitive nature of the ongoing government investigation we had to limit our responses to inquiries

Add to Reading List

Source URL: www.harrykrantz.com

Language: English - Date: 2015-07-28 22:05:23
28Computer security / Cyberwarfare / Cybercrime / Hacking / Cross-site scripting / Hypertext Transfer Protocol / SQL injection / Code injection / Cross-site request forgery / Vulnerability / Full disclosure / HTTP cookie

VoidSec Advisory 2016

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-13 11:30:11
29Signal processing / Wavelets / Telecommunications engineering / Digital signal processing / Filter bank / Electrical engineering / Wavelet / Art forgery / Pieter Bruegel the Elder

A Digital Technique Authentication for Art

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2004-08-20 13:50:04
30Cyberwarfare / Computer security / Computing / Hacking / Computer network security / Cryptography / National security / Cross-site request forgery / Oscar / SQL injection / Cross-site scripting / Application security

oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
UPDATE