Vector Security

Results: 220



#Item
141Validity / Security / Biometrics / Electronic signature / Digital signature / Signature / Verification / Validation / Cryptography / Systems engineering / Pharmaceutical industry

On-line Handwritten Signature Verification A White Paper from Vector Intelligence, Inc.: January, 2002

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2002-08-12 15:27:01
142Validity / Security / Biometrics / Electronic signature / Digital signature / Signature / Verification / Validation / Cryptography / Systems engineering / Pharmaceutical industry

On-line Handwritten Signature Verification A White Paper from Vector Intelligence, Inc.: January, 2002

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2002-08-08 09:45:56
143Security / Biometrics / Identification / Surveillance / Electronic signature / Title 21 CFR Part 11 / Validation / X Window System / Food and Drug Administration / Pharmaceutical industry / Pharmaceutical sciences / Software

Memo of Meeting; Vector Intelligence[removed]

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2002-08-12 15:27:00
144Security / Hacking / Software testing / Vulnerability / Social vulnerability / Environmental remediation / Framework Programmes for Research and Technological Development / Risk / Ethics / Management

SFBayBanner_Vector_outline

Add to Reading List

Source URL: www.adaptingtorisingtides.org

Language: English - Date: 2013-11-07 22:56:12
145Linear algebra / Technical communication / Vectors / Computer security / CVSS / Euclidean vector / Vulnerability / XML / Vector space / Algebra / Mathematics / Abstract algebra

XCCDF Developer Day Workshop February 23, 2010 Introduction This document contains a summary of the discussions and consensus decisions from the February 23 XCCDF Developer Day Workshop held at the National Institute of

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2010-03-11 07:42:54
146Computer security / CVSS / Computer network security / Markup languages / Vulnerability / XML / Euclidean vector / Computing / OSI protocols / Cyberwarfare

Discussion Topics and Fix Proposals Open Issues in XCCDF to be covered that the Security Automation Developer Day Workshop on February 23, 2010 This document covers a range of open issues in XCCDF that have been raised b

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2010-03-11 07:42:38
147Ciphertext / Malleability / RSA / Block cipher / Optimal asymmetric encryption padding / Chosen-plaintext attack / Initialization vector / Cipher / PKCS / Cryptography / Authenticated encryption / Chosen-ciphertext attack

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography Tibor Jager Horst G¨ortz Institute for IT Security Ruhr-University Bochum [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-04-11 09:39:21
148Authenticated encryption / Initialization vector / Adaptive chosen-ciphertext attack / Block cipher / Padding / Chosen-ciphertext attack / Telnet / Chosen-plaintext attack / Block cipher modes of operation / Cryptography / Espionage / Secure Shell

An extended abstract of this paper appears in Ninth ACM Conference on Computer and Communications Security, ACM, 2002. This is the full version. Authenticated Encryption in SSH: Provably Fixing the SSH Binary Packet Pro

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2002-09-20 17:38:46
149Initialization vector / Advantage / Cipher / Semantic security / Encryption / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Block cipher

Securing Cloud Data in the New Attacker Model 2 ˇ Ghassan O. Karame1 , Claudio Soriente2 , Krzysztof Lichota3 , Srdjan Capkun 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 10:18:08
150Support vector machine / Stylometry / Classifier / Binary classification / Supervised learning / Statistical hypothesis testing / Statistics / Machine learning / Statistical classification

Classify, but Verify: Breaking the Closed-World Assumption in Stylometric Authorship Attribution Ariel Stolerman, Rebekah Overdorf, Sadia Afroz and Rachel Greenstadt The Privacy, Security and Automation Lab Drexel Univer

Add to Reading List

Source URL: www.stolerman.net

Language: English - Date: 2014-02-05 17:38:49
UPDATE