CSRC

Results: 4036



#Item
411ISO standards / Ubiquitous computing / Computer security / Security / Contactless smart card / FIPS 140 / ISO/IEC / Card reader / Subscriber identity module / Cryptography / Cryptography standards / Smart cards

Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 10:01:24
412Internet protocols / Tunneling protocols / Internet Key Exchange / FIPS 140-2 / IPsec / FIPS 140 / Advanced Encryption Standard / Zeroisation / NSA Suite B Cryptography / Cryptography / Cryptographic protocols / Cryptography standards

Microsoft Word - 5h - IPCryptR2_Security_Policy - MotApproved.R010017.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-13 09:24:44
413Aruba Networks / Technology / Wireless LAN / FIPS 140 / Electronic engineering / Wireless access point / IEEE 802.11 / Cryptographic Module Validation Program / Cryptography standards / Wireless networking / Computing

Dell W-AP224 and W-AP225 Wireless Access Points with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPSJanuary 26, 2015 This is to advise that the Aruba Networks document entitled “FIPSNon-Propri

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 14:10:37
414

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2007-09-19 01:00:00
    415

    雪 峰 新疆雪峰科技(集团)股份有限公司 (乌鲁木齐市翠泉路东一巷 246 号)

    Add to Reading List

    Source URL: www.csrc.gov.cn

    Language: Chinese
      416Fault injection / Software testing / All-pairs testing / Software bug

      Combinatorial Methods in Software Testing Rick Kuhn National Institute of Standards and Technology Gaithersburg, MD

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-01-10 13:37:47
      417

      行政许可审核流程图

      Add to Reading List

      Source URL: www.csrc.gov.cn

        418

        行政许可审核流程图

        Add to Reading List

        Source URL: www.csrc.gov.cn

        - Date: 2015-04-14 13:35:20
          419Hash function / Information retrieval / Artificial intelligence / Information science / Cryptography / Cryptographic hash function / Message authentication codes / Hashing / HMAC

          ############################################################## Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2012-08-08 12:49:28
          420Wireless networking / Technology / FIPS 140 / Electronic engineering / Wireless access point / Wireless LAN / Computer network security / Cryptography standards / Computing / Aruba Networks

          Dell W-IAP3WN, W-IAP3WNP, W-IAP108, W-IAP109, W-AP114, and W-AP115 Wireless Access Points with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPSJanuary 26, 2015 This is to advise that the Aruba Networks

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-03-25 14:29:21
          UPDATE