Security parameter

Results: 155



#Item
21Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2015-07-03 05:13:02
22Ciena Corporation Ciena 6500 Packet-Optical Platform 4x10G Hardware Version: 1.0 Firmware Version: 1.10  FIPSNon-Proprietary Security Policy

Ciena Corporation Ciena 6500 Packet-Optical Platform 4x10G Hardware Version: 1.0 Firmware Version: 1.10 FIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:26:59
23HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015

HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:09:52
24Microsoft Word - 22e - Security Policy APK-0.6.docx

Microsoft Word - 22e - Security Policy APK-0.6.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:49:37
25TIDSecurityPolicy (Apricorn_15.04.10_V1.19)

TIDSecurityPolicy (Apricorn_15.04.10_V1.19)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:17:10
26Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:05:36
27On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 06:52:51
28Microsoft WordSanDisk Security Policy v1.12 - changes accepted.doc

Microsoft WordSanDisk Security Policy v1.12 - changes accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-10-16 01:00:00
29A Bayesian network approach to threat evaluation with application to an air defense scenario

A Bayesian network approach to threat evaluation with application to an air defense scenario

Add to Reading List

Source URL: isif.org

Language: English - Date: 2014-10-02 18:06:47
30Network Working Group Request for Comments: 5202 Category: Experimental P. Jokela Ericsson Research NomadicLab

Network Working Group Request for Comments: 5202 Category: Experimental P. Jokela Ericsson Research NomadicLab

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2008-04-18 18:59:08