Inter-protocol exploitation (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Inter-protocol exploitation" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
low place
low place
low place
low place
3,700th place
2,360th place
low place
low place
2nd place
2nd place
11th place
8th place
low place
low place

doi.org

  • Buccafurri, F.; Caminiti, G.; Lax, G. (August 2008). "Signing the document content is not enough: A new attack to digital signature". 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). pp. 520–525. doi:10.1109/ICADIWT.2008.4664402. ISBN 978-1-4244-2623-2. S2CID 14070590.

marcoramilli.blogspot.co.uk

ngssoftware.com

  • "Inter-protocol Communication" (PDF). Aug 2006. Archived from the original (PDF) on 2008-05-11. Retrieved 2013-02-22.
  • "Inter-protocol Exploitation". 2007-03-05. Archived from the original on 2010-11-04. Retrieved 2010-07-08.

remote.org

semanticscholar.org

api.semanticscholar.org

  • Buccafurri, F.; Caminiti, G.; Lax, G. (August 2008). "Signing the document content is not enough: A new attack to digital signature". 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). pp. 520–525. doi:10.1109/ICADIWT.2008.4664402. ISBN 978-1-4244-2623-2. S2CID 14070590.

softcomputing.net

theregister.com

  • Biancuzzi, Federico (27 June 2007). "Worms 2.0!". www.theregister.com. Retrieved 23 August 2022.

web.archive.org

  • "Inter-protocol Communication" (PDF). Aug 2006. Archived from the original (PDF) on 2008-05-11. Retrieved 2013-02-22.
  • "HTML Form Protocol Attack". Archived from the original on 2013-04-20. Retrieved 2013-02-22.
  • "Inter-protocol Exploitation". 2007-03-05. Archived from the original on 2010-11-04. Retrieved 2010-07-08.