Forgery

Results: 1137



#Item
861Key management / Advantage / Public-key cryptography / CBC-MAC / Block cipher / Cipher / Key size / Tiny Encryption Algorithm / Digital signature forgery / Cryptography / Message authentication codes / Block cipher modes of operation

Related-Key and Key-Collision Attacks Against RMAC

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:23:34
862Justice / Assignment / Suspension / Law / Punishments / Civil law

Standards for Student Behavior Infraction I. Academic A. Cheating, Forgery, Plagiarism Frequency of Infraction

Add to Reading List

Source URL: www.chariho.k12.ri.us

Language: English - Date: 2011-09-29 09:27:51
863Gao / Government procurement in the United States / Authentication / United States Military Standard / Defense Logistics Agency / Online shopping / Business / Security / Counterfeit / Forgery

GAO[removed], DOD SUPPLY CHAIN: Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2012-03-26 13:20:23
864Forgery / Money / Royal Canadian Mint / Gold coin / United States dollar / Coin / Currency / Economy of Canada / Counterfeit

Microsoft Word - EBulletinVol2No7February20_2006.doc

Add to Reading List

Source URL: www.rcna.ca

Language: English - Date: 2008-10-22 16:20:15
865Financial economics / Government debt / Public finance / Warrant of payment / Banking / Warrant / Cheque / Notary public / Oregon / Payment systems / Finance / Law

AFFIDAVIT OF FORGERY STATE OF OREGON County of ___________________

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-11-21 13:24:54
866Finite fields / Hashing / Galois/Counter Mode / CBC-MAC / Cryptographic hash function / HMAC / CMAC / Block cipher / MD5 / Message authentication codes / Cryptography / Block cipher modes of operation

Multiple forgery attacks against Message Authentication Codes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 13:53:41
867Counterfeit / Forgery / Online retailers / Online shopping / Brand / Amazon.com / Shopping / Internet fraud / Business / Electronic commerce / Fraud

Fraud of the Month December 2013.pub

Add to Reading List

Source URL: www.consumerjungle.org

Language: English - Date: 2013-12-13 14:19:22
868Money / Cheque / Voucher / Payment / Check / Payment systems / Business / Economics

New York State Department of Taxation and Finance Division of the Treasury Request for Stop Payment, Replacement Check, Photocopy of Check, or Forgery Affidavit Agency information — All fields must be completed.

Add to Reading List

Source URL: www.osc.state.ny.us

Language: English - Date: 2014-05-10 02:56:38
869Crimes / Money forgery / United States Secret Service / Phishing / Identity theft / Fraud / Organized crime / Cyberwarfare / Patriot Act / Cybercrime / Law / Computer crimes

United StateS Secret Service electronic crimeS taSk ForceS

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2014-05-09 15:34:28
870Computer network security / Hacking / Software testing / Vulnerability / Cross-platform software / Scripting languages / Cross-site scripting / Cross-site request forgery / Buffer overflow / Cyberwarfare / Computer security / Computing

Microsoft Word - Vulnerability Type Distributions in CVE.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-06-07 12:01:36
UPDATE