Security parameter

Results: 155



#Item
151Scripting languages / HTTP / Cross-site scripting / Software testing / Uniform resource locator / Cross-site request forgery / SQL injection / JavaScript / Vulnerability / Computing / Software / Computer security

Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications Marco Balduzzi∗, Carmen Torrano Gimenez ‡, Davide Balzarotti∗, and Engin Kirda∗ § ∗ Institute Eurecom, Sophia Antipolis

Add to Reading List

Source URL: www.iseclab.org

Language: English - Date: 2011-02-01 09:33:41
152Computer security / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / FIPS 140-3 / Zeroisation / Cryptographic Module Testing Laboratory / Federal Information Processing Standard / Critical Security Parameter / Cryptography / Cryptography standards / Security

FIPS PUB[removed]CHANGE NOTICES[removed]FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supercedes FIPS PUB 140-1, 1994 January 11)

Add to Reading List

Source URL: www.mcoecn.org

Language: English - Date: 2013-09-10 04:58:29
153Radio-frequency identification / IP / Error detection and correction / Security parameter / Technology / Applied mathematics / Telecommunications engineering / Cryptography / Advantage / Digital signature transponder

RFID distance bounding protocol with mixed challenges to prevent relay attacks Chong Hee Kim and Gildas Avoine

Add to Reading List

Source URL: sites.uclouvain.be

Language: English - Date: 2009-07-03 13:34:38
154Arab–Israeli conflict / Israeli-occupied territories / Israeli–Palestinian conflict / Zionism / Palestinian National Authority / Golan Heights / Israel / Human security / State of Palestine / Western Asia / Asia / Palestinian nationalism

WATER: THE HYDRAULIC PARAMETER OF CONFLICT IN THE MIDDLE EAST AND NORTH

Add to Reading List

Source URL: www.usafa.edu

Language: English - Date: 2012-11-20 17:37:01
155Information / IP / Zero-knowledge proof / Radio-frequency identification / NP / Communications protocol / Authentication protocol / Man-in-the-middle attack / Security parameter / Cryptography / Cryptographic protocols / Data

PDF Document

Add to Reading List

Source URL: sites.uclouvain.be

Language: English - Date: 2010-06-22 11:06:21
UPDATE