Forgery

Results: 1137



#Item
61Computer access control / Access control / Authentication / Notary / Packaging / Password

Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong Mathias Payer

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
62Hacking / Computer network security / Computer security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-01-20 16:34:29
63Business / Economy / Professional studies / Forgery / E-commerce / Counterfeit / Credit card / Banknote / Purchasing / Online shopping

TIPS FOR CONSUMERS BOUGHT A COUNTERFEIT? WHAT TO DO Whether in a store, on the street or on the internet, not everything that at first glance looks real is genuinely real. In this fact sheet, you’ll learn how you can

Add to Reading List

Source URL: www.stop-piracy.ch

Language: English - Date: 2014-07-18 05:41:10
64

Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Hanno Böck* Aaron Zauner†‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-05-17 13:33:54
    65Crime / Misconduct / Counterfeit consumer goods / Forgery / Economy / Counterfeit / Brand piracy / Organized crime / Copyright infringement / Smuggling

    A4_Ausstellungstext_e.indd

    Add to Reading List

    Source URL: www.afd.admin.ch

    Language: English - Date: 2016-04-25 10:58:26
    66Hacking / Web design / Digital typography / News aggregators / Social engineering / Cross-site scripting / Cross-site request forgery / NoScript / Content Security Policy / JavaScript / Clickjacking / Cascading Style Sheets

    Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2012-08-16 02:39:46
    67Forgery / Counterfeit consumer goods / Counterfeit / Copyright infringement / Piracy / Counterfeit watch / Counterfeit medicines online

    Microsoft Word - STOP_PIRACY_Factsheet_2015_EN.docx

    Add to Reading List

    Source URL: www.stop-piracy.ch

    Language: English - Date: 2016-04-20 10:29:14
    68Computing / Software engineering / Computer security / Web development / Internet privacy / Scripting languages / Hypertext Transfer Protocol / Computer network security / HTTP cookie / Cross-site scripting / Cross-site request forgery / Dynamic web page

    WWWTrack: Security, Privacy, Reliability, and Ethics Session: Defending Against Emerging Threats Exposing Private Information by Timing Web Applications

    Add to Reading List

    Source URL: www.abortz.net

    Language: English - Date: 2016-01-16 18:17:58
    69

    1 ISOT Forgery Dataset Description An important issue that we need to address to achieve a robust CA system is to assess and strengthen the approach against forgeries. Stylometry analysis

    Add to Reading List

    Source URL: www.uvic.ca

    Language: English - Date: 2014-11-18 13:55:32
      70Computing / Computer security / World Wide Web / Hacking / Computer worms / Functional languages / Web programming / Cross-site scripting / XSS worm / Hypertext Transfer Protocol / Cross-site request forgery / JavaScript

      PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks Yinzhi Cao§ , Vinod Yegneswaran† , Phillip Porras† , and Yan Chen§ , {vinod, porras}@csl

      Add to Reading List

      Source URL: www.cs.northwestern.edu

      Language: English - Date: 2011-11-29 13:06:25
      UPDATE