-
2
-
-
85134634145
-
-
Internet Engineering Task Force, Request for Comments: 5374; November
-
Multicast Extensions to the Security Architecture for the Internet Protocol. Internet Engineering Task Force, Request for Comments: 5374; November 2008.
-
(2008)
-
-
-
3
-
-
85134634946
-
-
Internet Engineering Task Force, Request for Comments: 4046; April
-
Multicast Security (MSEC) Group Key Management Architecture. Internet Engineering Task Force, Request for Comments: 4046; April 2005.
-
(2005)
-
-
-
5
-
-
13244299564
-
-
Internet Engineering Task Force, Request for Comments: 3748
-
Extensible Authentication Protocol (EAP) June 2004, Internet Engineering Task Force, Request for Comments: 3748.
-
(2004)
Extensible Authentication Protocol (EAP)
-
-
-
12
-
-
84882193960
-
Facebook Sees Need for Terabit Ethernet
-
Lawson S. Facebook Sees Need for Terabit Ethernet. Computerworld February 3, 2010.
-
(2010)
Computerworld
-
-
Lawson, S.1
-
13
-
-
0003470642
-
-
Internet Engineering Task Force, Request for Comments: 4301
-
Security Architecture for the Internet Protocol December 2005, Internet Engineering Task Force, Request for Comments: 4301.
-
(2005)
Security Architecture for the Internet Protocol
-
-
-
14
-
-
0004006818
-
-
Internet Engineering Task Force, Request for Comments: 4302
-
IP Authentication Header December 2005, Internet Engineering Task Force, Request for Comments: 4302.
-
(2005)
IP Authentication Header
-
-
-
15
-
-
0004044627
-
-
Internet Engineering Task Force, Request for Comments: 4303
-
IP Encapsulating Security Payload (ESP) December 2005, Internet Engineering Task Force, Request for Comments: 4303.
-
(2005)
IP Encapsulating Security Payload (ESP)
-
-
-
17
-
-
0004115841
-
-
Internet Engineering Task Force, Request for Comments: 2409
-
The Internet Key Exchange November 1998, Internet Engineering Task Force, Request for Comments: 2409.
-
(1998)
The Internet Key Exchange
-
-
-
18
-
-
1442292341
-
-
Internet Engineering Task Force, Request for Comments: 4306
-
Internet Key Exchange (IKEv2) Protocol December 2005, Internet Engineering Task Force, Request for Comments: 4306.
-
(2005)
Internet Key Exchange (IKEv2) Protocol
-
-
-
19
-
-
79955764516
-
-
Internet Engineering Task Force, Request for Comments: 5996
-
Internet Key Exchange Protocol Version 2 (IKEv2) September 2010, Internet Engineering Task Force, Request for Comments: 5996.
-
(2010)
Internet Key Exchange Protocol Version 2 (IKEv2)
-
-
-
24
-
-
0004035649
-
-
Internet Engineering Task Force, Request for Comments: 2246
-
The TLS Protocol Version 1.0 January 1999, Internet Engineering Task Force, Request for Comments: 2246.
-
(1999)
The TLS Protocol Version 1.0
-
-
-
28
-
-
84882195478
-
-
Packt Publishing, Birmingham, UK
-
Bantoft K., Wouters P. Openswan: Building and Integrating Virtual Private Networks: Learn from the Developers of Openswan How to Build Industry Standard, Military Grade VPNs and Connect Them with Windows, MacOSX, and Other VPN Vendors February 2006, Packt Publishing, Birmingham, UK.
-
(2006)
Openswan: Building and Integrating Virtual Private Networks: Learn from the Developers of Openswan How to Build Industry Standard, Military Grade VPNs and Connect Them with Windows, MacOSX, and Other VPN Vendors
-
-
Bantoft, K.1
Wouters, P.2
-
29
-
-
33746613037
-
-
Internet Engineering Task Force, Request for Comments: 4347
-
Datagram Transport Layer Security April 2006, Internet Engineering Task Force, Request for Comments: 4347.
-
(2006)
Datagram Transport Layer Security
-
-
-
30
-
-
85134633761
-
-
SSH CBC Vulnerability, US-CERT Vulnerability Note VU#958563.
-
SSH CBC Vulnerability, US-CERT Vulnerability Note VU#958563.
-
-
-
-
31
-
-
85134634966
-
-
SSH CRC32 Attack Detection Code Contains Remote Integer Overflow, US-CERT Vulnerability Note VU#945216.
-
SSH CRC32 Attack Detection Code Contains Remote Integer Overflow, US-CERT Vulnerability Note VU#945216.
-
-
-
-
32
-
-
33749461359
-
-
Internet Engineering Task Force, Request for Comments: 4250
-
The Secure Shell (SSH) Protocol Assigned Numbers January 2006, Internet Engineering Task Force, Request for Comments: 4250.
-
(2006)
The Secure Shell (SSH) Protocol Assigned Numbers
-
-
-
33
-
-
33749461359
-
-
Internet Engineering Task Force, Request for Comments: 4251
-
The Secure Shell (SSH) Protocol Architecture January 2006, Internet Engineering Task Force, Request for Comments: 4251.
-
(2006)
The Secure Shell (SSH) Protocol Architecture
-
-
-
34
-
-
33846448045
-
-
Internet Engineering Task Force, Request for Comments: 4252
-
The Secure Shell (SSH) Authentication Protocol January 2006, Internet Engineering Task Force, Request for Comments: 4252.
-
(2006)
The Secure Shell (SSH) Authentication Protocol
-
-
-
35
-
-
33846448045
-
-
Internet Engineering Task Force, Request for Comments: 4253
-
The Secure Shell (SSH) Transport Layer Protocol January 2006, Internet Engineering Task Force, Request for Comments: 4253.
-
(2006)
The Secure Shell (SSH) Transport Layer Protocol
-
-
-
36
-
-
33846448045
-
-
Internet Engineering Task Force, Request for Comments: 4253
-
The Secure Shell (SSH) Connection Protocol January 2006, Internet Engineering Task Force, Request for Comments: 4253.
-
(2006)
The Secure Shell (SSH) Connection Protocol
-
-
-
37
-
-
85134636443
-
-
SSH File Transfer Protocol. Internet-Draft from the Secure Shell Working Group.
-
SSH File Transfer Protocol. Internet-Draft from the Secure Shell Working Group.
-
-
-
-
41
-
-
0003487140
-
-
Telecommunications Standardization Section of ITU
-
Recommendation ITU-T H.323 Packet-Based Multimedia Communications Systems December 2009, Telecommunications Standardization Section of ITU.
-
(2009)
Packet-Based Multimedia Communications Systems
-
-
-
43
-
-
0037984544
-
-
Internet Engineering Task Force, Request for Comments: 2543
-
SIP: Session Initiation Protocol June 2002, Internet Engineering Task Force, Request for Comments: 2543.
-
(2002)
SIP: Session Initiation Protocol
-
-
-
48
-
-
33646909480
-
-
Internet Engineering Task Force, Request for Comments: 3711
-
The Secure Real-Time Transport Protocol (SRTP) March 2004, Internet Engineering Task Force, Request for Comments: 3711.
-
(2004)
The Secure Real-Time Transport Protocol (SRTP)
-
-
-
57
-
-
84882084368
-
New Methods in Hard Disk Encryption; Institute for Computer Languages Theory and Logic Group
-
Fruhwirth C. New Methods in Hard Disk Encryption; Institute for Computer Languages Theory and Logic Group. Vienna University of Technology July 18, 2005.
-
(2005)
Vienna University of Technology
-
-
Fruhwirth, C.1
-
58
-
-
17444407978
-
-
Santa Barbara, CA, LNCS, Crypto
-
Liskov M., Rivest R., Wagner D. Tweakable Block Ciphers 2002, Santa Barbara, CA, LNCS, Crypto.
-
(2002)
Tweakable Block Ciphers
-
-
Liskov, M.1
Rivest, R.2
Wagner, D.3
-
65
-
-
70350686780
-
-
Proceedings of the 2nd International Conference on Trusted Computing, TRUST, Oxford, UK, April 6-8, 2009; LNCS 5471, Springer, 2009
-
Turpe S., et al. Attacking the BitLocker Boot Process 2009, Proceedings of the 2nd International Conference on Trusted Computing, TRUST, Oxford, UK, April 6-8, 2009; LNCS 5471, Springer, 2009. DOI: 10.1007/978-3-642-00587-9_12.
-
(2009)
Attacking the BitLocker Boot Process
-
-
Turpe, S.1
-
66
-
-
85134635846
-
-
Proceedings of the 17th USENIX Security Symposium, 45-60
-
Halderman A.J., Schoen S.D., Heninger N., Clarkson W., Paul W., Candrino J.A., Feldman A.J., Appelbaum J., Felten E.W. Lest We Remember: Cold Boot Attacks on Encryption Keys August 2008, Proceedings of the 17th USENIX Security Symposium, 45-60.
-
(2008)
Lest We Remember: Cold Boot Attacks on Encryption Keys
-
-
Halderman, A.J.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Candrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
67
-
-
84882214086
-
-
What is Endpoint Security? http://www.endpointsecurity.org/Documents/What_is_endpointsecurity.pdf.
-
What is Endpoint Security?
-
-
-
70
-
-
84882153961
-
-
Greenemeier L. The TJX Effect August 11, 2007, http://www.informationweek.com/news/security/cybercrime/showArticle.jhtml%3FarticleID%3D201400171.
-
(2007)
The TJX Effect
-
-
Greenemeier, L.1
-
77
-
-
84882207681
-
Seven Desktop Security Suites Reviewed
-
Skoudis Ed, Carpenter M. Seven Desktop Security Suites Reviewed. Information Security Magazine November 2007, http://searchsecurity.techtarget.com/magazineContent/Product-review-Seven-integrated-endpoint-security-products.
-
(2007)
Information Security Magazine
-
-
Skoudis, E.1
Carpenter, M.2
-
78
-
-
85134633114
-
-
search on vendors Symantec.
-
National Vulnerability Database, search on vendors Symantec. http://web.nvd.nist.gov/view/vuln/search%3Fexecution%3De2s1.
-
-
-
-
80
-
-
85134632766
-
-
http://www.ironkey.com/.
-
-
-
-
83
-
-
85134636003
-
-
search for VMware and/or Xen.
-
National Vulnerability Database, search for VMware and/or Xen. http://web.nvd.nist.gov/view/vuln/search%3Fexecution%3De2s1.
-
-
-
-
90
-
-
84882180539
-
-
Oberheide J., Lanier Z. TEAM JOCH vs. Android January 28-30, 2011, Presentation made at ShmooCon 2011 Conference, Washington, DC. http://n0where.org/talks/shmoo11-teamjoch_v4.pdf.
-
TEAM JOCH vs. Android
-
-
Oberheide, J.1
Lanier, Z.2
-
91
-
-
0003984174
-
-
Redmond, WA; Microsoft Press
-
McConnell S. Code Complete 2004, Redmond, WA; Microsoft Press. 2nd ed.
-
(2004)
Code Complete
-
-
McConnell, S.1
-
92
-
-
84889026875
-
-
Linux Foundation
-
Kroah-Hartman G., Corbet J., McPherson A. Linux Kernel Development: How Fast It Is Going, Who Is Doing It, What They Are Doing, and Who Is Sponsoring It: An August 2009 Update 2009, Linux Foundation.
-
(2009)
Linux Kernel Development: How Fast It Is Going, Who Is Doing It, What They Are Doing, and Who Is Sponsoring It: An August 2009 Update
-
-
Kroah-Hartman, G.1
Corbet, J.2
McPherson, A.3
-
93
-
-
84882093710
-
-
website:
-
General Dynamics website:. http://www.gdc4s.com/content/detail.cfm%3Fitem%3D570bc11a-1d6d-4acf-a68e-c256a615808d%26page%3D2.
-
General Dynamics
-
-
-
94
-
-
85134634615
-
-
NSA SELinux Frequently Asked Questions: .
-
NSA SELinux Frequently Asked Questions: . http://www.nsa.gov/research/selinux/faqs.shtml.
-
-
-
-
95
-
-
85134636474
-
-
http://web.nvd.nist.gov/view/vuln/search.
-
-
-
-
96
-
-
85134635380
-
-
http://kerneltrap.org/mailarchive/linux-kernel/2008/2/2/700024.
-
-
-
-
98
-
-
85134634341
-
-
2010 IEEE Symposium on Security and Privacy, Oakland, CA
-
Koscher K., Czeskis A., Roesner F., Patel S., Kohno T. Experimental Security Analysis of a Modern Automobile May 19, 2010, 2010 IEEE Symposium on Security and Privacy, Oakland, CA.
-
(2010)
Experimental Security Analysis of a Modern Automobile
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
-
99
-
-
85134634737
-
-
2008 IEEE Symposium on Security and Privacy, Oakland, CA
-
Halperin D., Heydt-Benjamin T.S., Ransford B., Clark S.S. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses March 12, 2008, 2008 IEEE Symposium on Security and Privacy, Oakland, CA.
-
(2008)
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
-
101
-
-
0030243542
-
Toward Real Microkernels
-
Liedtke J. Toward Real Microkernels. Communications of the ACM September 1996, 39(9):70-77.
-
(1996)
Communications of the ACM
, vol.39
, Issue.9
, pp. 70-77
-
-
Liedtke, J.1
-
102
-
-
85134633733
-
-
O'Reilly, Sebastopol, CA, C. DiBona, S. Stone, M. Ockman (Eds.)
-
Appendix A, Open Sources: Voices from the Open Source Revolution 1999, O'Reilly, Sebastopol, CA. C. DiBona, S. Stone, M. Ockman (Eds.).
-
(1999)
Appendix A, Open Sources: Voices from the Open Source Revolution
-
-
-
104
-
-
84882120396
-
-
US-CERT/NIST National Vulnerability Database Vulnerability Summary for CVE-2011-3402 http://web.nvd.nist.gov/view/vuln/detail%3FvulnId%3DCVE-2011-3402.
-
Vulnerability Summary for CVE-2011-3402
-
-
-
106
-
-
85134634330
-
-
Proceedings of the 12th USENIX Security Symposium, Washington, DC
-
Jaeger T., Sailer R., Zhang X. Analyzing Integrity Protection in the SELinux Example Policy August 4-8, 2003, Proceedings of the 12th USENIX Security Symposium, Washington, DC.
-
(2003)
Analyzing Integrity Protection in the SELinux Example Policy
-
-
Jaeger, T.1
Sailer, R.2
Zhang, X.3
-
109
-
-
85134634740
-
-
IEEE Symposium on Security and Privacy, Berkeley, CA
-
King S., Peter C., Yi-Min W., Chad V., Helen J.W., Jacob R.L. SubVirt: Implementing Malware with Virtual Machines May 21-24, 2006, IEEE Symposium on Security and Privacy, Berkeley, CA.
-
(2006)
SubVirt: Implementing Malware with Virtual Machines
-
-
King, S.1
Peter, C.2
Yi-Min, W.3
Chad, V.4
Helen, J.W.5
Jacob, R.L.6
-
111
-
-
85134632468
-
-
Black Hat USA, Las Vegas, NV
-
Rutkowska J., Tereshkin A., Wojtczuk R. Detecting and Preventing the Xen Hypervisor Subversions," "Bluepilling the Xen Hypervisor," "Subverting the Xen Hypervisor August 7, 2008, Black Hat USA, Las Vegas, NV.
-
(2008)
Detecting and Preventing the Xen Hypervisor Subversions," "Bluepilling the Xen Hypervisor," "Subverting the Xen Hypervisor
-
-
Rutkowska, J.1
Tereshkin, A.2
Wojtczuk, R.3
-
112
-
-
59449108823
-
-
CVE-2008-2100 National Vulnerability Database http://web.nvd.nist.gov/view/vuln/detail%3FvulnId%3DCVE-2008-2100.
-
National Vulnerability Database
-
-
-
115
-
-
85134632940
-
-
Maxtor Basics Personal Storage 3200 (PS 3200) virus [205131] Seagate Knowledge Base, online URL http://seagate.custkb.com/seagate/crm/selfservice/search.jsp%3FDocId%3D205131.
-
Seagate Knowledge Base, online URL
-
-
-
116
-
-
44449083733
-
The Hunt for the Kill Switch
-
Adee S. The Hunt for the Kill Switch. IEEE Spectrum Magazine May 2008, http://spectrum.ieee.org/semiconductors/design/the-hunt-for-the-kill-switch/.
-
(2008)
IEEE Spectrum Magazine
-
-
Adee, S.1
-
120
-
-
85134634580
-
-
Trusted Computing Group (TCP) Trusted Platform Module (TPM) Main Specification Level 2, Version 1.2, Revision 116 (in three parts, "Design Principles," "Structures of the TPM," "Commands") March 1, 2011.
-
(2011)
Level 2, Version 1.2, Revision 116 (in three parts, "Design Principles," "Structures of the TPM," "Commands")
-
-
-
121
-
-
85134633593
-
-
Architecture for Interoperability, Specification Version 1.4, Revision 4, May 18
-
Trusted Computing Group (TCG) Trusted Network Connection (TNC) Architecture for Interoperability, Specification Version 1.4, Revision 4, May 18, 2009.
-
(2009)
-
-
-
122
-
-
85134635077
-
-
eSecurity Planet; July 19, 2002; online URL:
-
Sharon G. Security Expert: U.S. Companies Unprepared for Cyber Terror eSecurity Planet; July 19, 2002; online URL:. http://www.esecurityplanet.com/trends/article.php/1429851/Security-Expert-US-Companies-Unprepared-For-Cyber-Terror.htm.
-
Security Expert: U.S. Companies Unprepared for Cyber Terror
-
-
Sharon, G.1
-
124
-
-
85134633665
-
-
http://en.wikipedia.org/wiki/Comparison_of_programming_languages.
-
-
-
-
127
-
-
33751583338
-
-
Microsoft Development Network.
-
Working with Import Libraries and Export Files Microsoft Development Network. http://msdn.microsoft.com/library/default.aspurl=/library/en-us/vccore/html/_core_working_with_import_libraries_and_export_files.asp.
-
Working with Import Libraries and Export Files
-
-
-
132
-
-
84856524858
-
-
O'Reilly, Sebastol, CA, C. DiBona, S. Ockman, M. Stone (Eds.)
-
Voices from the Open Source Revolution 1999, O'Reilly, Sebastol, CA. C. DiBona, S. Ockman, M. Stone (Eds.).
-
(1999)
Voices from the Open Source Revolution
-
-
-
133
-
-
85134634533
-
CDRH Software Forensics Lab: Applying Rocket Science to Device Analysis
-
Chloe Taft, "Medical Devices Technology, "The Gray Sheet (October, 2007).
-
"CDRH Software Forensics Lab: Applying Rocket Science to Device Analysis" Chloe Taft, "Medical Devices Technology, "The Gray Sheet (October, 2007).
-
-
-
-
136
-
-
85134636151
-
-
http://www.splint.org.
-
-
-
-
137
-
-
85134634159
-
-
ISO/IEC 9899-1999 (December 1999).
-
ISO/IEC 9899-1999 (December 1999).
-
-
-
-
138
-
-
85134632914
-
-
C-The C1X Charter. Document WG14N1250 (June 2007).
-
C-The C1X Charter. Document WG14N1250 (June 2007).
-
-
-
-
139
-
-
85134632634
-
-
ISO/IEC 14882:2011. Programming Language-C++ (August 2011).
-
ISO/IEC 14882:2011. Programming Language-C++ (August 2011).
-
-
-
-
144
-
-
32544455274
-
From MC/DC to RC/DC: Formalization and Analysis of Control-Flow Testing Criteria
-
Sergiy V.A., Bowen J.P. From MC/DC to RC/DC: Formalization and Analysis of Control-Flow Testing Criteria. Formal Aspects of Computing 2002, 18(1).
-
(2002)
Formal Aspects of Computing
, vol.18
, Issue.1
-
-
Sergiy, V.A.1
Bowen, J.P.2
-
146
-
-
0037330636
-
Understanding the Windows EAL4 Evaluation
-
Shapiro J.S. Understanding the Windows EAL4 Evaluation. Computer February 2003, 36(2):103-105.
-
(2003)
Computer
, vol.36
, Issue.2
, pp. 103-105
-
-
Shapiro, J.S.1
-
158
-
-
65749098082
-
Embedded Software: Facts, Figures, and Future
-
Ebert C., Jones C. Embedded Software: Facts, Figures, and Future. Computer April 2009, 42(4):42-52.
-
(2009)
Computer
, vol.42
, Issue.4
, pp. 42-52
-
-
Ebert, C.1
Jones, C.2
-
159
-
-
0009811887
-
Notes on Structured Programming. Technological University Eindhoven, Department of Mathematics
-
The Netherlands; August
-
Dijkstra EW. Notes on Structured Programming. Technological University Eindhoven, Department of Mathematics. The Netherlands; August 1969.
-
(1969)
-
-
Dijkstra, E.W.1
-
161
-
-
85013989545
-
-
Elsevier, Burlington, MA
-
Friedenthal S., Moore A., Steiner R. A Practical Guide to SysML: The Systems Modeling Language 2008, Elsevier, Burlington, MA.
-
(2008)
A Practical Guide to SysML: The Systems Modeling Language
-
-
Friedenthal, S.1
Moore, A.2
Steiner, R.3
-
162
-
-
0042297467
-
-
Addison-Wesley, Reading, MA
-
Mellor S.J., Balcer M.J. Executable UML, A Foundation for Model-Driven Architecture 2002, Addison-Wesley, Reading, MA.
-
(2002)
Executable UML, A Foundation for Model-Driven Architecture
-
-
Mellor, S.J.1
Balcer, M.J.2
-
166
-
-
0016114085
-
Monitors: An Operating System Structuring Concept
-
Hoare C.A. Monitors: An Operating System Structuring Concept. Communications of the ACM October 1974, 547-548.
-
(1974)
Communications of the ACM
, pp. 547-548
-
-
Hoare, C.A.1
-
167
-
-
0026221661
-
The Synchronous Dataflow Programming Language Lustre
-
Halbwachs N., Caspi P., Raymond P., Pilaud D. The Synchronous Dataflow Programming Language Lustre. Proceedings of the IEEE September 1991, 79(9):1305-1320.
-
(1991)
Proceedings of the IEEE
, vol.79
, Issue.9
, pp. 1305-1320
-
-
Halbwachs, N.1
Caspi, P.2
Raymond, P.3
Pilaud, D.4
-
168
-
-
0026953373
-
The Esterel Synchronous Programming Language, Design, Semantics and Implementation
-
Berry G., Gonthier G. The Esterel Synchronous Programming Language, Design, Semantics and Implementation. Science of Computer Programming February 1992, 87-152.
-
(1992)
Science of Computer Programming
, pp. 87-152
-
-
Berry, G.1
Gonthier, G.2
-
169
-
-
85134633154
-
-
COTS Compartmentalized Operations Protection Profile - Operating Systems (CCOPP-OS), Version 2.0; June 19
-
COTS Compartmentalized Operations Protection Profile - Operating Systems (CCOPP-OS), Version 2.0; June 19, 2008.
-
(2008)
-
-
-
173
-
-
85134633706
-
-
Fact Sheet No. 1 for the National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information (CNSSP-15) (June 2003).
-
Fact Sheet No. 1 for the National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information (CNSSP-15) (June 2003).
-
-
-
-
174
-
-
85134636616
-
-
NSA Suite B Cryptography http://www.nsa.gov/ia/programs/suiteb_cryptography.
-
-
-
-
176
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
Claude S., et al. Communication Theory of Secrecy Systems. Bell System Technical Journal 1949, 28(4):656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Claude, S.1
-
178
-
-
85134634793
-
-
AES Key Wrap Specification http://csrc.nist.gov/groups/ST/toolkit/documents/kms/AES_key_wrap.pdf.
-
-
-
-
179
-
-
85134632867
-
-
Network Working Group, Request for Comments: 3610 (September 2003).
-
Counter with CBC-MAC (CCM). Network Working Group, Request for Comments: 3610 (September 2003).
-
-
-
-
180
-
-
85134632885
-
-
Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality (May 2004).
-
NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality (May 2004).
-
-
-
-
183
-
-
85134636463
-
-
Recommendation for Key Management-Part 1: General (Revised) (March 2007).
-
NIST Special Publication 800-57. Recommendation for Key Management-Part 1: General (Revised) (March 2007).
-
-
-
-
184
-
-
85134632791
-
-
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Internet Engineering Task Force, Request for Comments: 5280 (May 2008).
-
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Internet Engineering Task Force, Request for Comments: 5280 (May 2008).
-
-
-
-
185
-
-
85134636450
-
-
Suite B Certificate and Certificate Revocation List (CRL) Profile, Internet Engineering Task Force, Request for Comments: 5759 January 2010.
-
Suite B Certificate and Certificate Revocation List (CRL) Profile, Internet Engineering Task Force, Request for Comments: 5759 January 2010.
-
-
-
-
186
-
-
85134635389
-
-
SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV), Version 0.97, Certicom Research (March 2011).
-
SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV), Version 0.97, Certicom Research (March 2011).
-
-
-
-
187
-
-
85134633297
-
-
Finding Collisions in the Full SHA-1 (February 2005). Proceedings of Crypto Core.
-
Xiaoyun W, Lisa Y, Hongbo Y. Finding Collisions in the Full SHA-1 (February 2005). Proceedings of Crypto Core.
-
-
-
Xiaoyun, W.1
Lisa, Y.2
Hongbo, Y.3
-
188
-
-
85134636721
-
Cryptanalysis on SHA-1, Presented by Adi Shamir at the Rump Session of CRYPTO 2005
-
Xiaoyun W, Andrew CY, Frances Y. Cryptanalysis on SHA-1, Presented by Adi Shamir at the Rump Session of CRYPTO 2005.
-
-
-
Xiaoyun, W.1
Andrew, C.Y.2
Frances, Y.3
-
189
-
-
0003629991
-
-
Federal Information Processing Publication 180-2
-
Secure Hash Standard August 1, 2002, Federal Information Processing Publication 180-2.
-
(2002)
Secure Hash Standard
-
-
-
190
-
-
85134635443
-
-
Internet Engineering Task Force, Request for Comments: 2104 (February 1997).
-
HMAC: Keyed-Hashing for Message Authentication, Internet Engineering Task Force, Request for Comments: 2104 (February 1997).
-
-
-
-
192
-
-
85134632583
-
-
NIST Special Publication 800-22-Revision 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (April 2010).
-
NIST Special Publication 800-22-Revision 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (April 2010).
-
-
-
-
193
-
-
85134636500
-
-
Annex C: Approved Random Number Generators for FIPS PUB 140-2, Security Requirements for Cryptographic Modules (DRAFT) (June 14, 2011).
-
Annex C: Approved Random Number Generators for FIPS PUB 140-2, Security Requirements for Cryptographic Modules (DRAFT) (June 14, 2011).
-
-
-
-
194
-
-
85134633773
-
-
Recommendation for Random Number Generation Using Deterministic Bit Generators (Revised) (May 2011).
-
NIST Special Publication 800-90A-Revision 1. Recommendation for Random Number Generation Using Deterministic Bit Generators (Revised) (May 2011).
-
-
-
-
195
-
-
85134632810
-
-
ANSI X9.82-3-2007. Random Number Generation-Part 3: Deterministic Random Bit Generators (September 2007).
-
ANSI X9.82-3-2007. Random Number Generation-Part 3: Deterministic Random Bit Generators (September 2007).
-
-
-
-
196
-
-
84863895358
-
Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World
-
Oswald D., Paar C. Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. CHES 2011, Nara September 30, 2011.
-
(2011)
CHES 2011, Nara
-
-
Oswald, D.1
Paar, C.2
-
197
-
-
85134632538
-
-
Telecommunication Standardization Sector, G.729: Coding of Speed at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear Prediction (CS-ACELP) (January 2007).
-
International Telecommunications Union. Telecommunication Standardization Sector, G.729: Coding of Speed at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear Prediction (CS-ACELP) (January 2007).
-
-
-
-
199
-
-
85134635856
-
-
Federal Information Processing Standards Publication 140-2: Security Requirements for Cryptographic Modules, (January 11, 1994).
-
Federal Information Processing Standards Publication 140-2: Security Requirements for Cryptographic Modules, (January 11, 1994).
-
-
-
-
200
-
-
85134635410
-
-
Federal Information Processing Standards Publication 140-3: Security Requirements for Cryptographic Modules (Revised DRAFT) (September 11, 2009).
-
Federal Information Processing Standards Publication 140-3: Security Requirements for Cryptographic Modules (Revised DRAFT) (September 11, 2009).
-
-
-
|