21![Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti† Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†](https://www.pdfsearch.io/img/24e5a2241177450222ec08653d29a07b.jpg) | Add to Reading ListSource URL: www.eng.biu.ac.ilLanguage: English - Date: 2015-07-03 05:13:02
|
---|
22![Ciena Corporation Ciena 6500 Packet-Optical Platform 4x10G Hardware Version: 1.0 Firmware Version: 1.10 FIPSNon-Proprietary Security Policy Ciena Corporation Ciena 6500 Packet-Optical Platform 4x10G Hardware Version: 1.0 Firmware Version: 1.10 FIPSNon-Proprietary Security Policy](https://www.pdfsearch.io/img/54be46de7cfb05b8895bd6215ede812e.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-21 10:26:59
|
---|
23![HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015 HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015](https://www.pdfsearch.io/img/941b3dc9b4f6f4abb1b04139c384818c.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-22 08:09:52
|
---|
24![Microsoft Word - 22e - Security Policy APK-0.6.docx Microsoft Word - 22e - Security Policy APK-0.6.docx](https://www.pdfsearch.io/img/d47e0efa079780318e1d8e83d139fc8d.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-21 15:49:37
|
---|
25![TIDSecurityPolicy (Apricorn_15.04.10_V1.19) TIDSecurityPolicy (Apricorn_15.04.10_V1.19)](https://www.pdfsearch.io/img/019363a147b230c811d0ce2803ab4499.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-21 10:17:10
|
---|
26![Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015 Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015](https://www.pdfsearch.io/img/1ce6e0d744b3a2741232c3b7a586474a.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-05-22 08:05:36
|
---|
27![On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong](https://www.pdfsearch.io/img/5099017386cfaec434bf46d35f2118fc.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-27 06:52:51
|
---|
28![Microsoft WordSanDisk Security Policy v1.12 - changes accepted.doc Microsoft WordSanDisk Security Policy v1.12 - changes accepted.doc](https://www.pdfsearch.io/img/988cc7d0f31adc9a486a533a015c1608.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2008-10-16 01:00:00
|
---|
29![A Bayesian network approach to threat evaluation with application to an air defense scenario A Bayesian network approach to threat evaluation with application to an air defense scenario](https://www.pdfsearch.io/img/b20ecd58011bb6f8f3f02f6bab7824d7.jpg) | Add to Reading ListSource URL: isif.orgLanguage: English - Date: 2014-10-02 18:06:47
|
---|
30![Network Working Group Request for Comments: 5202 Category: Experimental P. Jokela Ericsson Research NomadicLab Network Working Group Request for Comments: 5202 Category: Experimental P. Jokela Ericsson Research NomadicLab](https://www.pdfsearch.io/img/41d37f1d0f73458cc3c2a277ef0af9d5.jpg) | Add to Reading ListSource URL: www.rfc-editor.orgLanguage: English - Date: 2008-04-18 18:59:08
|
---|