Forgery

Results: 1137



#Item
81

Increased DNS Forgery Resistance Through 0x20-Bit Encoding SecURItY viA LeET QueRieS David Dagon Manos Antonakakis

Add to Reading List

Source URL: courses.isi.jhu.edu

Language: English - Date: 2014-07-10 18:02:52
    82

    "Pseudo-Paracelsus: Alchemy and Forgery in Early Modern Medicine and Natural Philosophy" Villa Vigoni (Italy), 25-28 July 2016 Organized by Didier Kahn and Hiro Hirai

    Add to Reading List

    Source URL: philsci.org

    Language: English - Date: 2015-10-06 10:42:03
      83Smartphones / Cross-platform software / Cloud storage / Cloud clients / Mobile operating systems / Mobile application development / Google Play / Cross-site request forgery / App store / Google Drive / Android / Mobile app

      Indirect File Leaks in Mobile Applications Daoyuan Wu and Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong {csdwu, csrchang}@comp.polyu.edu.hk

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2015-05-20 23:58:45
      84Computing / Software engineering / Software / Scripting languages / JavaScript / Ajax / Cross-site request forgery / World Wide Web / Security / Cross-site scripting / Same-origin policy / HTTP cookie

      The Unexpected Dangers of Dynamic JavaScript Sebastian Lekies Ruhr-University Bochum Ben Stock

      Add to Reading List

      Source URL: dl.dropboxusercontent.com

      Language: English
      85Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

      Application Security Checklist V1.0 Document Audience Application Developers

      Add to Reading List

      Source URL: security.uci.edu

      Language: English - Date: 2016-02-23 10:01:01
      86Business / Forgery / Counterfeit consumer goods / Crime / Pharmaceuticals policy / Misconduct / Counterfeit / Brand piracy / UGG / Pharmaceutical industry in China / Banknote / Organized crime

      Business strategies in the counterfeit market

      Add to Reading List

      Source URL: cocoa.ethz.ch

      Language: English - Date: 2013-07-17 07:25:38
      87Software / Computing / Computer access control / Computer security / Hacking / Social engineering / User interface techniques / Security / Cross-site request forgery / Cross-site scripting / Phishing / Clickjacking

      A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

      Add to Reading List

      Source URL: dl.dropboxusercontent.com

      Language: English
      88Computing / Software / Web development / Computer network security / HTML / World Wide Web / JavaScript / Cross-site scripting / Cross-site request forgery / HTTP cookie / Browser security / OpenSocial

      Talking to Strangers Without Taking Their Candy: Isolating Proxied Content Adrienne Felt, Pieter Hooimeijer, David Evans, Westley Weimer University of Virginia {felt, pieter, evans, weimer}@cs.virginia.edu

      Add to Reading List

      Source URL: www.cs.virginia.edu

      Language: English - Date: 2008-03-19 15:40:17
      89Cross-platform software / Scripting languages / Cloud clients / Portable software / Firefox add-ons / Cross-site request forgery / Firebug / JavaScript / Cross-site scripting / Chromium / Google Chrome / Firefox

      Institute of Distributed Systems Ulm University Preparation Document

      Add to Reading List

      Source URL: cmichi.github.io

      Language: English - Date: 2014-07-09 05:38:52
      90

      Forgery Claim Blurs Tribe’s Fate Saturday, August 27, 2005 By Serdar Tumgoren () • ‘-

      Add to Reading List

      Source URL: amahmutsun.org

      Language: English - Date: 2013-05-14 14:32:52
        UPDATE