Security parameter

Results: 155



#Item
1

Flash Parameter Injection A SECURITY ADVISORY A whitepaper from IBM Rational Application Security Team Yuval Baror Ayal Yogev Adi Sharabani

Add to Reading List

Source URL: blog.watchfire.com

Language: English - Date: 2008-10-02 08:51:13
    2

    “Http Parameter Contamination” Research paper Ivan Markovic <> Network Security Solutions, Serbia 2011 http://netsec.rs/

    Add to Reading List

    Source URL: www.exploit-db.com

    - Date: 2011-07-15 16:32:26
      3

      A preliminary version of this paper appears in the proceedings of ASIACRYPTThis is the full version. NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion Mihir Bellare1

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-09-08 13:17:49
        4Cryptography / Security / Computer security / Key management / Computer network security / National security / USB flash drive / FIPS 140 / Critical Security Parameter / Key / Password / Zeroisation

        iStorage Limited │www.istorage-uk.com SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2016-07-15 09:06:22
        5

        How to configure WIFI of cameras In the camera “parameter”-- “WIFI”, The WIFI configuration screen. ① Check the ② click

        Add to Reading List

        Source URL: www.lowcost-security.ch

        - Date: 2015-02-11 08:42:37
          6Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

          Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2016-07-27 10:26:48
          7Complexity classes / Cryptography / Computational complexity theory / Proof of knowledge / IP / Quantum complexity theory / Soundness / NP / Commitment scheme / PSPACE / PP / Security parameter

          J. Cryptol: 116–135 DOI: s00145x Parallel Repetition of Computationally Sound Protocols Revisited∗ Krzysztof Pietrzak

          Add to Reading List

          Source URL: www.nada.kth.se

          Language: English - Date: 2012-05-30 09:00:34
          8Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / Cryptographic Module Validation Program / SHA-2 / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / Cryptography / PKCS / AES implementations

          Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

          Add to Reading List

          Source URL: www.bouncycastle.org

          Language: English - Date: 2016-08-02 22:30:34
          9Internet protocols / Cryptographic protocols / Internet Standards / Tunneling protocols / IPsec / Ping / Authenticated encryption / Network packet / Security Parameter Index / IPv4 / Transmission Control Protocol / Padding

          On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

          Add to Reading List

          Source URL: www.isg.rhul.ac.uk

          Language: English - Date: 2010-12-10 09:12:20
          10Cryptographic protocols / Internet protocols / IPsec / Tunneling protocols / Computer network security / Internet security / Internet Key Exchange / Internet layer / Internet Security Association and Key Management Protocol / Security service / Security Parameter Index / Layer 2 Tunneling Protocol

          Network Working Group Request for Comments: 2401 Obsoletes: 1825 Category: Standards Track S. Kent

          Add to Reading List

          Source URL: iaoc.ietf.org

          Language: English - Date: 2015-11-01 16:21:19
          UPDATE