Results 261 to 270 of about 36,777 (311)
Neural Network Method of Analysing Sensor Data to Prevent Illegal Cyberattacks. [PDF]
Vladov S +5 more
europepmc +1 more source
Universal forgery attack on a strong designated verifier signature scheme.
Chien-Lung Hsu, Han-Yu Lin
openalex +1 more source
Enhancing resilience of distributed DC microgrids against cyber attacks using a transformer-based Kalman filter estimator. [PDF]
Rostami SMH, Pourgholi M, Asharioun H.
europepmc +1 more source
Responding to reports of nitazene toxicity in Australia
Medical Journal of Australia, Volume 222, Issue 5, Page 216-219, March 2025.
Brendan Clifford +5 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Preventing server-side request forgery attacks
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 2021In today's web, it is not uncommon for web applications to take a complete URL as input from users. Usually, once the web application receives a URL, the server opens a connection to it. However, if the URL points to an internal service and the server still makes the connection, the server becomes vulnerable to Server-Side Request Forgery (SSRF ...
Bahruz Jabiyev +3 more
openaire +1 more source
A Practical Forgery Attack on Lilliput-AE
Journal of Cryptology, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Orr Dunkelman +3 more
openaire +1 more source
Preventing Cross Site Request Forgery Attacks
2006 Securecomm and Workshops, 2006The Web has become an indispensable part of our lives. Unfortunately, as our dependency on the Web increases, so does the interest of attackers in exploiting Web applications and Web-based information systems. Previous work in the field of Web application security has mainly focused on the mitigation of cross site scripting (XSS) and SQL injection ...
Nenad Jovanovic +2 more
openaire +1 more source
Almost universal forgery attacks on AES-based MAC’s
Designs, Codes and Cryptography, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dunkelman, Orr +2 more
openaire +1 more source
Forgery Attack to Authentication of Anycast Communication
Applied Mechanics and Materials, 2011Al-Ibrahim and Cerny proposed an authentication scheme of anycast communication. Their scheme is based on El-Gamal type signature scheme. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure.
Jin Song Zhan, Cheng Lian Liu
openaire +1 more source

