Recent content

TypeTitleAuthorRepliesLast updated
Book pageKey Management Processes Daryle06 years 10 months ago
Book pageMAC Generation Algorithm Daryle06 years 10 months ago
Book pageAcquirer Originated Message Formats Daryle06 years 10 months ago
Book pageCardholder Orders Daryle06 years 10 months ago
Book pageShopping Cart Orders Daryle06 years 10 months ago
Book pageMerchant Originated Message Formats Daryle06 years 10 months ago
Book pageThe NEC Protocol (NECP) Daryle06 years 10 months ago
Book pageTechnical Specification of the MAC Generation Daryle06 years 10 months ago
Book pageMessage Authentication Codes Daryle06 years 10 months ago
Book pagePossible Responses to these Vulnerabilities Daryle06 years 10 months ago
Book pageA Third Vulnerability: Order Authorization Spoofing Daryle06 years 10 months ago
Book pageA Possible Vulnerability: Store and Forward Daryle06 years 10 months ago
Book pageAnother Possible Vulnerability: Arbitrary Transactions against a Card Daryle06 years 10 months ago
Book pagePossible Vulnerabilities Daryle06 years 10 months ago
Book pageThe Security Model of the Proposed Model Daryle06 years 10 months ago
Book pageFeatures in the Proposed Model Daryle06 years 10 months ago
Book pageHigh Level Approach Daryle06 years 10 months ago
Book pageOverview Daryle06 years 10 months ago
Book pageReferences Daryle06 years 10 months ago
Book pageConclusion Daryle06 years 10 months ago
Book pageA New Theoretical Perspective Daryle06 years 10 months ago
Book pageDefinitions Daryle06 years 10 months ago
Book pageA Critical Look at the Disease Model Daryle06 years 10 months ago
Book pageIntroduction Daryle06 years 10 months ago
PageThe Disease Model of Alcoholism Revisited: Why people drink. Daryle06 years 10 months ago

Pages