Recent content

TypeTitleAuthorRepliesLast updated
Book pageKey Management Processes Daryle06 years 4 months ago
Book pageMAC Generation Algorithm Daryle06 years 4 months ago
Book pageAcquirer Originated Message Formats Daryle06 years 4 months ago
Book pageCardholder Orders Daryle06 years 4 months ago
Book pageShopping Cart Orders Daryle06 years 4 months ago
Book pageMerchant Originated Message Formats Daryle06 years 4 months ago
Book pageThe NEC Protocol (NECP) Daryle06 years 4 months ago
Book pageTechnical Specification of the MAC Generation Daryle06 years 4 months ago
Book pageMessage Authentication Codes Daryle06 years 4 months ago
Book pagePossible Responses to these Vulnerabilities Daryle06 years 4 months ago
Book pageA Third Vulnerability: Order Authorization Spoofing Daryle06 years 4 months ago
Book pageA Possible Vulnerability: Store and Forward Daryle06 years 4 months ago
Book pageAnother Possible Vulnerability: Arbitrary Transactions against a Card Daryle06 years 4 months ago
Book pagePossible Vulnerabilities Daryle06 years 4 months ago
Book pageThe Security Model of the Proposed Model Daryle06 years 4 months ago
Book pageFeatures in the Proposed Model Daryle06 years 4 months ago
Book pageHigh Level Approach Daryle06 years 4 months ago
Book pageOverview Daryle06 years 4 months ago
Book pageReferences Daryle06 years 5 months ago
Book pageConclusion Daryle06 years 5 months ago
Book pageA New Theoretical Perspective Daryle06 years 5 months ago
Book pageDefinitions Daryle06 years 5 months ago
Book pageA Critical Look at the Disease Model Daryle06 years 5 months ago
Book pageIntroduction Daryle06 years 5 months ago
PageThe Disease Model of Alcoholism Revisited: Why people drink. Daryle06 years 5 months ago

Pages