Home - Smart Card Alliance
The Smart Card Alliance, a non-profit association, works ... All Rights Reserved. Generated: Fri Jul 17 05:46:44 -0400 2009. http://www.smartcardalliance.org ...
http://www.smartcardalliance.org/
popularity:
smartcard
smartcards
security
rfid
smart_card
smart
research
alliance
standards
standard
|
OAuth — An open protocol to allow secure API authentication in a simple and standard method from desktop and web applications.
An OAuth security issue has been identified and addressed in version 1.0a of the ... OAuth is a simple way to publish and interact with protected data. ...
similarity:
popularity:
authentication
api
security
oauth
openid
opensource
identity
standards
web
web2.0
|
ISECOM - Institute for Security and Open Methodologies
Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
similarity:
popularity:
security
opensource
infosec
reference
standards
hacking
technology
sysadmin
certification
pentest
|
American National Standards Institute - ANSI
Mission to enhance global competitiveness of U.S. business and quality of life by promoting and facilitating voluntary consensus standards and conformity assessment systems.
similarity:
popularity:
standards
ansi
reference
standard
engineering
american
science
technology
organization
usa
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
Proximity Cards
No information avaiable
similarity:
popularity:
rfid
security
electronics
diy
hardware
hacking
hack
howto
hacks
proximity
|
ISECOM - OSSTMM Open Source Security Testing Methodology Manual
The Open Source Security Testing Methodology Manual (OSSTMM) is a peer-reviewed ... The OSSTMM focuses on the technical details of exactly which items need to be ...
similarity:
popularity:
security
opensource
methodology
pentest
testing
reference
hacking
policy
howto
standards
|
Offensive Computing | Community Malicious code research and analysis
Finding the TDSS authors and affiliates ---- An Analysis. Released Buster Sandbox Analyzer ... Intelligence and operational level by Siberia Exploit Pack ...
similarity:
popularity:
security
malware
virus
hacking
research
reference
tools
spyware
software
exploits
|
Touch
The film has been made as a follow up to this video experiment and has been ... "Utopian and radical architects in the 1960s predicted that cities in the future ...
similarity:
popularity:
rfid
design
technology
blog
mobile
research
nfc
touch
interaction
interface
|
Common Criteria - The Common Criteria Portal
Products can be evaluated by competent and independent licensed laboratories so ... Supporting documents, are used within the Common Criteria certification process ...
similarity:
popularity:
security
standards
commoncriteria
reference
certification
infosec
criteria
cc
software
common
|
Category:OWASP Application Security Verification Standard Project - OWASP
No information avaiable
similarity:
popularity:
security
owasp
webappsec
standards
application
testing
webapp
development
asvs
standard
|