First Page | Document Content | |
---|---|---|
Date: 2012-03-30 06:50:04Computing World Wide Web Software engineering Internet privacy Cross-site request forgery Computer network security Hacking Ajax Same-origin policy Cross-site scripting HTTP cookie Referer spoofing | Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford UniversityAdd to Reading ListSource URL: www.doc.ic.ac.ukDownload Document from Source WebsiteFile Size: 2,95 MBShare Document on Facebook |