Which of the following secure coding techniques can be used to prevent cross-site request forgery attacks?