blob: 86c88f7489051448f5b96a9540efc322dde243e0 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
|
\input{conf}
\title{
\begin{center}
\includegraphics[scale=0.2]{data/unict-logo.png}
\end{center}
\small\textsc{Dipartimento di Matematica e Informatica\\Corso di Internet Security}\\
\Huge\textbf{M6: Insecure Authorization}\\
\author{Santo Cariotti}
\date{5 dicembre 2022}
}
\usepackage{graphicx}
\begin{document}
\maketitle
\renewcommand{\contentsname}{Indice}
\tableofcontents{}
\chapter{Introduzione}
\input{chapters/introduction}
\chapter{Possibile attacco a JWT}
\input{chapters/jwt-attacks}
\chapter{Set up}
\input{chapters/setup}
\chapter{Traffico di rete}
\input{chapters/network}
\chapter{Conclusione}
\input{chapters/conclusion}
\bibliography{refs}
\bibliographystyle{ieeetr}
\end{document}
|