changes.mady.by.user Dhruv Mohindra
Saved on Oct 05, 2009
Saved on Oct 07, 2009
...
MSC11-J. Limit the lifetime of sensitive data
MSC12-J. Do not use insecure or weak cryptographic algorithms
MSC30-J. Generate truly random numbers