Security parameter

Results: 155



#Item
41Penetration test / EC-Council / Hacker / White hat / Hacker Halted / Computer security conference / Hacking / Computing / Computer security

Hackers Invade St. Louis for TakeDownCon 2013 Parameter Security hosts premier hacking and offensive cyber security conference. Saint Louis, MO (PRWEB) March 14, [removed]Famous Chinese military general, Sun Tzu, once sai

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2013-03-14 18:01:19
42Secure two-party computation / Security parameter / Valuation / Mathematics / Applied mathematics / Cryptographic protocols / Secure multi-party computation / Universal composability

Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness Juan A. Garay∗ Philip MacKenzie∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-03-03 15:33:45
43Computer network security / Software testing / Hacking / OWASP / Vulnerability / SQL injection / Cross-site scripting / Code injection / Application firewall / Computer security / Cyberwarfare / Security

HTTP Parameter Pollution Vulnerabilities in Web Applications Marco `embyte` Balduzzi Swiss Cyber Storm[removed]May 2011

Add to Reading List

Source URL: media.hacking-lab.com

Language: English - Date: 2011-06-08 04:51:58
44Computing / FIPS 140-2 / Security token / FIPS 140 / Smart card / Critical Security Parameter / Cryptographic Module Validation Program / Authentication / Cryptography standards / Computer security / Security

1B - Feitien ePass Token - FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-16 12:03:46
45Cryptographic software / FIPS 140-2 / Critical Security Parameter / FIPS 140 / Advanced Encryption Standard / SHA-2 / Microsoft CryptoAPI / Crypto++ / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-29 08:49:50
46Critical Security Parameter / Computing / Cyberwarfare / Cryptography standards / Computer security / FIPS 140

IBM Corporation IBM Security QRadar FIPS Appliance Hardware Part Number: QR24; Firmware Version: v7.1 MR1 FIPS[removed]Non-Proprietary Security Policy FIPS Security Level: 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 11:26:25
47Data analysis / Humanitarian aid / Nutrition / Food security / Non-parametric statistics / Variance / Parameter / Food and Agriculture Organization / Estimation theory / Statistics / Statistical inference / Food politics

PDF Document

Add to Reading List

Source URL: www.fao.org

Language: English - Date: 2009-08-30 20:05:58
48FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Critical Security Parameter / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 12:21:50
49Cryptographic software / FIPS 140-2 / Critical Security Parameter / Key Wrap / FIPS 140 / Key size / BitLocker Drive Encryption / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 1e - EFJohnson Technologies - Security Policy v5_28.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-10 14:59:55
50FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Key Wrap / Critical Security Parameter / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 11:58:21
UPDATE