Recent content

TypeTitleAuthorRepliesLast updated
Book pageMAC Generation Algorithm Daryle05 years 1 day ago
Book pageAcquirer Originated Message Formats Daryle05 years 1 day ago
Book pageCardholder Orders Daryle05 years 1 day ago
Book pageShopping Cart Orders Daryle05 years 1 day ago
Book pageMerchant Originated Message Formats Daryle05 years 1 day ago
Book pageThe NEC Protocol (NECP) Daryle05 years 1 day ago
Book pageTechnical Specification of the MAC Generation Daryle05 years 1 day ago
Book pageMessage Authentication Codes Daryle05 years 1 day ago
Book pagePossible Responses to these Vulnerabilities Daryle05 years 1 day ago
Book pageA Third Vulnerability: Order Authorization Spoofing Daryle05 years 1 day ago
Book pageA Possible Vulnerability: Store and Forward Daryle05 years 1 day ago
Book pageAnother Possible Vulnerability: Arbitrary Transactions against a Card Daryle05 years 1 day ago
Book pagePossible Vulnerabilities Daryle05 years 1 day ago
Book pageThe Security Model of the Proposed Model Daryle05 years 1 day ago
Book pageFeatures in the Proposed Model Daryle05 years 1 day ago
Book pageHigh Level Approach Daryle05 years 1 day ago
Book pageOverview Daryle05 years 1 day ago
Book pageReferences Daryle05 years 1 week ago
Book pageConclusion Daryle05 years 1 week ago
Book pageA New Theoretical Perspective Daryle05 years 1 week ago
Book pageDefinitions Daryle05 years 1 week ago
Book pageA Critical Look at the Disease Model Daryle05 years 1 week ago
Book pageIntroduction Daryle05 years 1 week ago
PageThe Disease Model of Alcoholism Revisited: Why people drink. Daryle05 years 1 week ago
Book pageReferences Daryle05 years 1 week ago

Pages