31![Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011 Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011](https://www.pdfsearch.io/img/4b003f4dde1ad7ab075fa678d0c1cd4f.jpg) | Add to Reading ListSource URL: www.cigital.comLanguage: English - Date: 2013-11-26 20:39:31
|
---|
32![A Blueprint for Enterprise Session Border Controller - Whitepaper A Blueprint for Enterprise Session Border Controller - Whitepaper](https://www.pdfsearch.io/img/fe72a8d59ed58b4128a00026a0928a89.jpg) | Add to Reading ListSource URL: www.oracle.comLanguage: English |
---|
33![Black-Box Security Testing for Web Applications and Services Dennis Appelt Software Verification and Validation Laboratory 17, December, 2013 Black-Box Security Testing for Web Applications and Services Dennis Appelt Software Verification and Validation Laboratory 17, December, 2013](https://www.pdfsearch.io/img/dbfbee04711a04f7d245e55529416c0a.jpg) | Add to Reading ListSource URL: www.fnr.luLanguage: English |
---|
34![Microsoft Word - Scott Contini.doc Microsoft Word - Scott Contini.doc](https://www.pdfsearch.io/img/857e3f8dfa768f0cb3af656b85626c4a.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 11:08:36
|
---|
35![X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN <joan.daemen@st.com> To: <hash-function@nist.gov> X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN <joan.daemen@st.com> To: <hash-function@nist.gov>](https://www.pdfsearch.io/img/bb62a8106ae8b99c1c08995106fb4c24.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 09:10:52
|
---|
36 To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo" title="X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo" class="img-responsive img-polaroid"> | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 11:02:04
|
---|
37![X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi <a-yamagi@ipa.go.jp> User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi <a-yamagi@ipa.go.jp> User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr](https://www.pdfsearch.io/img/16ab2f489ebf3290774cf8309bb5ff3b.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 08:08:26
|
---|
38![2nd Cryptographic Hash Workshop[removed], Santa Barbara, California) How to Construct Double-Block-Length Hash Functions 2nd Cryptographic Hash Workshop[removed], Santa Barbara, California) How to Construct Double-Block-Length Hash Functions](https://www.pdfsearch.io/img/e84c551477352e96e93024714c2aba55.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 08:51:10
|
---|
39![Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14 Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14](https://www.pdfsearch.io/img/8f82621305d40a76e0eefef6be5184b9.jpg) | Add to Reading ListSource URL: dimacs.rutgers.eduLanguage: English - Date: 2005-07-15 15:00:33
|
---|
40![Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems](https://www.pdfsearch.io/img/3a09ed6912fa997e5c9ab8f307b4613f.jpg) | Add to Reading ListSource URL: fc14.ifca.aiLanguage: English - Date: 2014-02-15 11:15:30
|
---|