Tuesday 23 October 2012

References
[1]Fu, Xinwen. "Black Hat DC 2009 Briefings Speaker List." One Cell is Enough to Break Tor's
Anonymity. 15 Jan 2009. Department of Computer Science, University of Massachusetts
Lowell. <http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Fu>.
[2]"Onion routing." 5 Jan. 2009. Wikipedia. <http://en.wikipedia.org/wiki/Onion_routing>.
[3]“DNS rebinding." 26 Dec. 2008. Wikipedia. <http://en.wikipedia.org/wiki/DNS_rebinding>.
[4]van Kesteren, Anne. "Access Control for Cross-Site Requests." . 12 Sept. 2008. World Wide
Web Consortium. <http://www.w3.org/TR/access-control/>.
[5]Resig, John. Embedding and Encoding in JavaScript. 9 Apr. 2008.
<http://ejohn.org/blog/embedding-and-encoding-in-javascript/>.
[6]Masinter, L. "The data URL scheme." IETF RFCs. Aug. 1998. IETF. 5 Dec. 2008
<http://tools.ietf.org/html/rfc2397>.
[7]Rager, Anton. XSS-Proxy. 9 Feb. 2005. <http://xss-proxy.sourceforge.net/>.
[8]Mavituna, Ferruh. "XSS Shell." . 11 Oct. 2008. Portcullis Labs.
<http://labs.portcullis.co.uk/application/xssshell/>.
[9]Veness, Chris. "AES Advanced Encryption Standard." . 1 Aug. 2008. Movable Type Scripts.
<http://www.movable-type.co.uk/scripts/aes.html>.

No comments:

Post a Comment