<--- Back to Details
First PageDocument Content
Cryptography / CBEFF / BioAPI / Basic Encoding Rules / Keystroke dynamics / XML / Abstract Syntax Notation One / Cryptographic hash function / Message authentication code / Security / Biometrics / Computing
Date: 2005-10-18 11:23:44
Cryptography
CBEFF
BioAPI
Basic Encoding Rules
Keystroke dynamics
XML
Abstract Syntax Notation One
Cryptographic hash function
Message authentication code
Security
Biometrics
Computing

XML Common Biometric Format

Add to Reading List

Source URL: xml.coverpages.org

Download Document from Source Website

File Size: 605,00 KB

Share Document on Facebook

Similar Documents

Computer access control / Cryptography / Software / Computer security / YubiKey / Hash-based message authentication code / Double-click / Configure script / Authentication

How to Configure Identical Credentials Configuration Guide

DocID: 1rlsV - View Document

Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

DocID: 1qZv0 - View Document

Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

DocID: 1qHZI - View Document

Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

DocID: 1q5Q3 - View Document

Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

DocID: 1q44R - View Document