Security parameter

Results: 155



#Item
1Flash Parameter Injection A SECURITY ADVISORY A whitepaper from IBM Rational Application Security Team Yuval Baror Ayal Yogev Adi Sharabani

Flash Parameter Injection A SECURITY ADVISORY A whitepaper from IBM Rational Application Security Team Yuval Baror Ayal Yogev Adi Sharabani

Add to Reading List

Source URL: blog.watchfire.com

Language: English - Date: 2008-10-02 08:51:13
    2“Http Parameter Contamination” Research paper Ivan Markovic <> Network Security Solutions, Serbia 2011 http://netsec.rs/

    “Http Parameter Contamination” Research paper Ivan Markovic <> Network Security Solutions, Serbia 2011 http://netsec.rs/

    Add to Reading List

    Source URL: www.exploit-db.com

    - Date: 2011-07-15 16:32:26
      3A preliminary version of this paper appears in the proceedings of ASIACRYPTThis is the full version. NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion Mihir Bellare1

      A preliminary version of this paper appears in the proceedings of ASIACRYPTThis is the full version. NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion Mihir Bellare1

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-09-08 13:17:49
        4iStorage Limited │www.istorage-uk.com  SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

        iStorage Limited │www.istorage-uk.com SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2016-07-15 09:06:22
        5How to configure WIFI of cameras In the camera “parameter”-- “WIFI”, The WIFI configuration screen. ① Check the  ② click

        How to configure WIFI of cameras In the camera “parameter”-- “WIFI”, The WIFI configuration screen. ① Check the ② click

        Add to Reading List

        Source URL: www.lowcost-security.ch

        - Date: 2015-02-11 08:42:37
          6Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

          Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2016-07-27 10:26:48
          7J. Cryptol: 116–135 DOI: s00145x Parallel Repetition of Computationally Sound Protocols Revisited∗ Krzysztof Pietrzak

          J. Cryptol: 116–135 DOI: s00145x Parallel Repetition of Computationally Sound Protocols Revisited∗ Krzysztof Pietrzak

          Add to Reading List

          Source URL: www.nada.kth.se

          Language: English - Date: 2012-05-30 09:00:34
          8Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

          Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

          Add to Reading List

          Source URL: www.bouncycastle.org

          Language: English - Date: 2016-08-02 22:30:34
          9On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

          On the (In)Security of IPsec in MAC-then-Encrypt Configurations ∗ Jean Paul Degabriele

          Add to Reading List

          Source URL: www.isg.rhul.ac.uk

          Language: English - Date: 2010-12-10 09:12:20
          10Network Working Group Request for Comments: 2401 Obsoletes: 1825 Category: Standards Track  S. Kent

          Network Working Group Request for Comments: 2401 Obsoletes: 1825 Category: Standards Track S. Kent

          Add to Reading List

          Source URL: iaoc.ietf.org

          Language: English - Date: 2015-11-01 16:21:19