Forgery

Results: 1137



#Item
71Transport Layer Security / Computing / Internet / Cryptography / Internet security / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / HTTPS / GnuTLS / Heartbleed / Cross-site request forgery

The BEAST Wins Again: Why TLS Keeps Failing to Protect HTTP Antoine Delignat-Lavaud, Inria Paris Joint work with K. Bhargavan, C. Fournet, A. Pironti, P.-Y. Strub INTRODUCTION

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 08:53:57
72

Non-Seven Major Felony Offenses OFFENSE FELONY POSSESSION OF STOLEN PROPERTY FORGERY/THEFT_FRAUD/IDENTITY THEFT ARSON FELONY SEX CRIMES (3)

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2015-10-06 11:30:30
    73Security / Social engineering / Hacking / Computing / Clickjacking / Cybercrime / World Wide Web / Framekiller / Computer security / Cross-site request forgery

    Introduction Attack vectors Counteractive measures Conclusion and outlook UI Redressing:

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2011-09-01 10:03:44
    74Computing / Software engineering / Software / Web development / Functional languages / Web programming / Hacking / Web applications / JavaScript / Opa / Cross-site scripting / Cross-site request forgery

    Dagstuhl SeminarWeb Application Security 29.03. – Executive Summary Dan Boneh1 , Ulfar Erlingsson2 , Martin Johns3 and Benjamin Livshits4 1

    Add to Reading List

    Source URL: drops.dagstuhl.de

    Language: English - Date: 2010-08-09 09:34:32
    75Law / Counterfeit consumer goods / Crime / Misconduct / Pharmaceuticals policy / Intellectual property law / Monopoly / Forgery / Counterfeit / Anti-Counterfeiting Trade Agreement / Intellectual property / Copyright infringement

    Brand Protection 2020 Perspectives on the Issues Shaping the Global Risk and Response to Product Counterfeiting Jeremy M. Wilson, Ph.D.

    Add to Reading List

    Source URL: a-capp.msu.edu

    Language: English - Date: 2015-09-29 11:31:27
    76

    Generic Universal Forgery Attack on Iterative Hash-based MACs Thomas Peyrin and Lei Wang EUROCRYPT 2014

    Add to Reading List

    Source URL: ec14.compute.dtu.dk

    Language: English - Date: 2014-05-16 06:27:32
      77Hacking / Cloud standards / Computer access control / Computer network security / Web development / JavaScript / HTTP cookie / Password manager / Cross-site request forgery / Cross-site scripting / Browser security / OAuth

      Language-based Defenses against Untrusted Browser Origins Karthikeyan Bhargavan and Antoine Delignat-Lavaud, INRIA Paris-Rocquencourt; Sergio Maffeis, Imperial College London This paper is included in the Proceedings of

      Add to Reading List

      Source URL: www.defensivejs.com

      Language: English - Date: 2013-08-15 09:17:30
      78

      Introduction of Noah Charney by Pieter van Os September 24, 2015 Noah Charney knows a lot about art forgers, as becomes evident in his wonderful book The Art of Forgery. So you would think: he secretly admires them, at l

      Add to Reading List

      Source URL: www.john-adams.nl

      Language: English - Date: 2015-09-24 18:28:51
        79Ajax / Cross-site request forgery / JavaScript / JSON

        Institute of Distributed Systems Ulm University Cross Site Request Forgery Michael Müller | Practical IT-Security | ss 2014

        Add to Reading List

        Source URL: cmichi.github.io

        Language: English - Date: 2014-07-09 05:38:52
        80

        Practical Forgery Attacks on SCREAM and iSCREAM Siang Meng Sim and Lei Wang Division of Mathematical Sciences, School of Physical and Mathematical Science, Nanyang Technological University, Singapore

        Add to Reading List

        Source URL: www1.spms.ntu.edu.sg

        Language: English - Date: 2014-03-31 07:39:59
          UPDATE