exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 161 RSS Feed

Files Date: 1999-10-01 to 1999-10-02

part2.ps
Posted Oct 1, 1999

An Introduction to Computer Security: The NIST Handbook: A publication of the US National Institute of Standards and Technology. Draft Copy. Part II.

tags | paper
SHA-256 | 8f9d12fbac044a4b0584a70fe6eec9b12b887550eaa846b5bc3105678569fece
part2.ps
Posted Oct 1, 1999

Access Control and Policy Enforcement in Internetworks. Methods of controlling access policy between different administrative domains of an internetwork. Part II

tags | paper, protocol
SHA-256 | ee7be268f4f9fe5bdbd62723c89ca6764077f019982dd3ea18a0432e932ac78a
part3.ps
Posted Oct 1, 1999

An Introduction to Computer Security: The NIST Handbook: A publication of the US National Institute of Standards and Technology. Draft Copy. Part III.

tags | paper
SHA-256 | a693a97c84ae33514641f6589f5820ae731534dff52b790b42fd3a57d3b3d432
part3.ps
Posted Oct 1, 1999

Access Control and Policy Enforcement in Internetworks. Methods of controlling access policy between different administrative domains of an internetwork. Part III

tags | paper, protocol
SHA-256 | d76c592eb6b8041f87421a7ff0d041f4e04aac9e04d336f1cff67a5166f810cc
part4.ps
Posted Oct 1, 1999

An Introduction to Computer Security: The NIST Handbook: A publication of the US National Institute of Standards and Technology. Draft Copy. Part IV.

tags | paper
SHA-256 | 3a8563c610644c428e9b1507676464c926333f833921f2088708a729cf7465a2
part5.ps
Posted Oct 1, 1999

An Introduction to Computer Security: The NIST Handbook: A publication of the US National Institute of Standards and Technology. Draft Copy. Part V.

tags | paper
SHA-256 | d651d04513876c80456468d6f1c330192b82fa630622672449472fffe2371ca1
passbib.ps
Posted Oct 1, 1999

User Authentication and Related Topics: An Annotated Bibliography

tags | paper
SHA-256 | 08245ddd0136802271b1e792765b6280b2980b7cae625f9140b0d398766bc550
password.ps
Posted Oct 1, 1999

UNIX Password Security: A discussion of the importance of well-chosen passwords, and how passwords are cracked

tags | paper
systems | unix
SHA-256 | c8678acf4db6fbbcf4059305c7eb88ac5074fcae1a7fcb777e91c3266724a7a5
pbaa.ps
Posted Oct 1, 1999

Proxy-Based Authorization and Accounting for Distributed Systems: A method to support both authorization and accounting in a distributed environment

tags | paper
SHA-256 | 34a402fb72c945d9e211d6d2abe62b467e7e89e1110942fb7271bcde44e84424
pem.ps
Posted Oct 1, 1999

Privacy-Enhanced Electronic Mail: A description of the Internet Privacy-Enhanced Mail protocols

tags | paper, protocol
SHA-256 | 0cb7b079482a66d030b54cc26a7da43f5840afc26f73ceb62a56985563562da8
pkcs_1.ps
Posted Oct 1, 1999

RSA Encryption Standard.

tags | paper
SHA-256 | dbe506cec41f593395b029d9939fdc4ca786b68cb1ec63edf7c694c856b98c79
pkcs_10.ps
Posted Oct 1, 1999

Certifcation Request Syntax Standard

tags | paper
SHA-256 | a9a839714e1e5e55b01bd54fffc8c1fd61ab3af9482f0bbeacd321a69940b462
pkcs_3.ps
Posted Oct 1, 1999

Diffie-Hellman Key-Agreement Standard.

tags | paper
SHA-256 | 5ce50cbd5ee511da5ea9062ba2d5aceec3ae57629c3db8b13268e8998d8a707d
pkcs_5.ps
Posted Oct 1, 1999

Password-Based Encryption Standard.

tags | paper
SHA-256 | b0edd00c16073e598ef69746bf3fea134a306f6ca1248268bebda68ef76af2e3
pkcs_6.ps
Posted Oct 1, 1999

Extended-Certificate Syntax Standard

tags | paper
SHA-256 | f07580a404b09591e31abb63f4336db5a256a916590aa109c00bb0c5a4fc3031
pkcs_7.ps
Posted Oct 1, 1999

Cryptographic Message Syntax Standard

tags | paper
SHA-256 | 6b81154cec3cdeced2eaec7c13f9e59f18a96f8b575988b430da0a159e2ea2f1
pkcs_8.ps
Posted Oct 1, 1999

Private-Key Information Syntax Standard

tags | paper
SHA-256 | 1d01be37b08823beb0ea019ee147a56090736098b92916e76058c74470e4e67c
pkcs_9.ps
Posted Oct 1, 1999

Selected Attribute Types

tags | paper
SHA-256 | c1bb3bc9fe6d6784c96c49a622f48d83e9c927edee767c518e951bb01b519b1c
pnetext.ps
Posted Oct 1, 1999

Pseudo-Network Drivers and Virtual Networks: A method for creating pseudo-networks, much like the pseudo-terminals in use on many UNIX systems.

tags | paper
systems | unix
SHA-256 | 1b54c147a27a7d981758cc12dcf1dcc3b3c71d45b74d00a107bf72ec4f341bc1
privacy.txt
Posted Oct 1, 1999

Complete text of the Privacy Act of 1974 and Amendments, 5 USC 552a

tags | paper
SHA-256 | b26f4a1db6e51f9b2ade6d6902621036c8b9e8310852b5febcf6bd667492faf4
privkey.ps
Posted Oct 1, 1999

Network Security via Private-Key Certificates: Some practical security protocols that use private-key encryption in the public-key style

tags | paper, protocol
SHA-256 | 3f459829ae5cc19ba32e6deaf65e3a866b37601e1a6c4b3d838bf6d799996e4e
psfos.ps
Posted Oct 1, 1999

Protection and Security Issues for Future Systems: An examination of the problems of protection and security as applied to future computer systems.

tags | paper
SHA-256 | 5d6fe182ed9630d4b08244ee3c447b81ee3f428b1b77d2410486bd92dcce2886
pwstudy.ps
Posted Oct 1, 1999

Password Security: A Case History: A description of the original UNIX password algorithm, and the reasons for replacing it with the current one

tags | paper
systems | unix
SHA-256 | ca6cfc5f377dcf373bb18130b53ef90f3f7c98de4ae14a86a88535f94b44da03
pwtenyrs.ps
Posted Oct 1, 1999

UNIX Password Security - Ten Years Later: A reexamination of the UNIX password algorithm after ten years of advances in software and hardware

tags | paper
systems | unix
SHA-256 | 93aafb58b4907d97438db4c8dfea03f1de784857ae6b9580f04bf9c47c4c552f
ritchie.ps
Posted Oct 1, 1999

On the Security of UNIX: The original UNIX security paper

tags | paper
systems | unix
SHA-256 | 9bac6dc5097a779ea1b31d7a8d59616f5a483035a7656d85804d9499b9756499
Page 5 of 7
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close