Oracle attack

Results: 62



#Item
31Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011

Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:31
32A Blueprint for Enterprise Session Border Controller - Whitepaper

A Blueprint for Enterprise Session Border Controller - Whitepaper

Add to Reading List

Source URL: www.oracle.com

Language: English
33Black-Box Security Testing for Web Applications and Services Dennis Appelt Software Verification and Validation Laboratory 17, December, 2013

Black-Box Security Testing for Web Applications and Services Dennis Appelt Software Verification and Validation Laboratory 17, December, 2013

Add to Reading List

Source URL: www.fnr.lu

Language: English
34Microsoft Word - Scott Contini.doc

Microsoft Word - Scott Contini.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:08:36
35X-Sieve: CMU Sieve 2.2   From: Joan DAEMEN <joan.daemen@st.com> To: <hash-function@nist.gov>

X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:10:52
36X-Sieve: CMU Sieve 2.2 From: To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo" title="X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo" class="img-responsive img-polaroid">

X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:02:04
37X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi <a-yamagi@ipa.go.jp> User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:08:26
382nd Cryptographic Hash Workshop[removed], Santa Barbara, California)  How to Construct Double-Block-Length Hash Functions

2nd Cryptographic Hash Workshop[removed], Santa Barbara, California) How to Construct Double-Block-Length Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:51:10
39Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14

Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-15 15:00:33
40Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:15:30