![]() |
The Smart Card Alliance, a non-profit association, works ... All Rights Reserved. Generated: Fri Jul 17 05:46:44 -0400 2009. http://www.smartcardalliance.org ...
http://www.smartcardalliance.org/
popularity:
smartcard
smartcards
security
rfid
smart_card
smart
research
alliance
standards
standard
|
|
An OAuth security issue has been identified and addressed in version 1.0a of the ... OAuth is a simple way to publish and interact with protected data. ...
similarity:
popularity:
authentication
api
security
oauth
openid
opensource
identity
standards
web
web2.0
|
|
Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
similarity:
popularity:
security
opensource
infosec
reference
standards
hacking
technology
sysadmin
certification
pentest
|
|
Mission to enhance global competitiveness of U.S. business and quality of life by promoting and facilitating voluntary consensus standards and conformity assessment systems.
similarity:
popularity:
standards
ansi
reference
standard
engineering
american
science
technology
organization
usa
|
|
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
|
No information avaiable
similarity:
popularity:
rfid
security
electronics
diy
hardware
hacking
hack
howto
hacks
proximity
|
|
The Open Source Security Testing Methodology Manual (OSSTMM) is a peer-reviewed ... The OSSTMM focuses on the technical details of exactly which items need to be ...
similarity:
popularity:
security
opensource
methodology
pentest
testing
reference
hacking
policy
howto
standards
|
![]() |
Finding the TDSS authors and affiliates ---- An Analysis. Released Buster Sandbox Analyzer ... Intelligence and operational level by Siberia Exploit Pack ...
similarity:
popularity:
security
malware
virus
hacking
research
reference
tools
spyware
software
exploits
|
|
The film has been made as a follow up to this video experiment and has been ... "Utopian and radical architects in the 1960s predicted that cities in the future ...
similarity:
popularity:
rfid
design
technology
blog
mobile
research
nfc
touch
interaction
interface
|
|
Products can be evaluated by competent and independent licensed laboratories so ... Supporting documents, are used within the Common Criteria certification process ...
similarity:
popularity:
security
standards
commoncriteria
reference
certification
infosec
criteria
cc
software
common
|
|
No information avaiable
similarity:
popularity:
security
owasp
webappsec
standards
application
testing
webapp
development
asvs
standard
|