Recent content

TypeTitleAuthorRepliesLast updated
Book pageKey Management Processes Daryle010 years 1 month ago
Book pageMAC Generation Algorithm Daryle010 years 1 month ago
Book pageAcquirer Originated Message Formats Daryle010 years 1 month ago
Book pageCardholder Orders Daryle010 years 1 month ago
Book pageShopping Cart Orders Daryle010 years 1 month ago
Book pageMerchant Originated Message Formats Daryle010 years 1 month ago
Book pageThe NEC Protocol (NECP) Daryle010 years 1 month ago
Book pageTechnical Specification of the MAC Generation Daryle010 years 1 month ago
Book pageMessage Authentication Codes Daryle010 years 1 month ago
Book pagePossible Responses to these Vulnerabilities Daryle010 years 1 month ago
Book pageA Third Vulnerability: Order Authorization Spoofing Daryle010 years 1 month ago
Book pageA Possible Vulnerability: Store and Forward Daryle010 years 1 month ago
Book pageAnother Possible Vulnerability: Arbitrary Transactions against a Card Daryle010 years 1 month ago
Book pagePossible Vulnerabilities Daryle010 years 1 month ago
Book pageThe Security Model of the Proposed Model Daryle010 years 1 month ago
Book pageFeatures in the Proposed Model Daryle010 years 1 month ago
Book pageHigh Level Approach Daryle010 years 1 month ago
Book pageOverview Daryle010 years 1 month ago
Book pageReferences Daryle010 years 2 months ago
Book pageConclusion Daryle010 years 2 months ago
Book pageA New Theoretical Perspective Daryle010 years 2 months ago
Book pageDefinitions Daryle010 years 2 months ago
Book pageA Critical Look at the Disease Model Daryle010 years 2 months ago
Book pageIntroduction Daryle010 years 2 months ago
PageThe Disease Model of Alcoholism Revisited: Why people drink. Daryle010 years 2 months ago

Pages