Results 261 to 270 of about 36,777 (311)

Neural Network Method of Analysing Sensor Data to Prevent Illegal Cyberattacks. [PDF]

open access: yesSensors (Basel)
Vladov S   +5 more
europepmc   +1 more source

Responding to reports of nitazene toxicity in Australia

open access: yes
Medical Journal of Australia, Volume 222, Issue 5, Page 216-219, March 2025.
Brendan Clifford   +5 more
wiley   +1 more source

Preventing server-side request forgery attacks

Proceedings of the 36th Annual ACM Symposium on Applied Computing, 2021
In today's web, it is not uncommon for web applications to take a complete URL as input from users. Usually, once the web application receives a URL, the server opens a connection to it. However, if the URL points to an internal service and the server still makes the connection, the server becomes vulnerable to Server-Side Request Forgery (SSRF ...
Bahruz Jabiyev   +3 more
openaire   +1 more source

A Practical Forgery Attack on Lilliput-AE

Journal of Cryptology, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Orr Dunkelman   +3 more
openaire   +1 more source

Preventing Cross Site Request Forgery Attacks

2006 Securecomm and Workshops, 2006
The Web has become an indispensable part of our lives. Unfortunately, as our dependency on the Web increases, so does the interest of attackers in exploiting Web applications and Web-based information systems. Previous work in the field of Web application security has mainly focused on the mitigation of cross site scripting (XSS) and SQL injection ...
Nenad Jovanovic   +2 more
openaire   +1 more source

Almost universal forgery attacks on AES-based MAC’s

Designs, Codes and Cryptography, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Dunkelman, Orr   +2 more
openaire   +1 more source

Forgery Attack to Authentication of Anycast Communication

Applied Mechanics and Materials, 2011
Al-Ibrahim and Cerny proposed an authentication scheme of anycast communication. Their scheme is based on El-Gamal type signature scheme. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure.
Jin Song Zhan, Cheng Lian Liu
openaire   +1 more source

Home - About - Disclaimer - Privacy