Cryptographic protocol

Results: 1374



#Item
921Cryptographic protocols / Electronic documents / Digital signature / Adobe Systems / Online Certificate Status Protocol / Public key certificate / Cryptography / Public-key cryptography / Key management

Adobe® Template Guidelines

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-04-25 17:36:05
922Security / United States government secrecy / Computing / VoIP phone / Wi-Fi / Universal Serial Bus / National Security Agency / Voice over IP / Cryptographic protocols / High Assurance Internet Protocol Encryptor / Cryptography

KOV-26B NSA Certified Mobile Type 1 Network Security Talon2 is a versatile high-assurance encryptor that enables users to access secure networks from virtually anywhere. Talon2 secures data classified up to TS/SCI acros

Add to Reading List

Source URL: www2.l-3com.com

Language: English - Date: 2014-09-03 13:11:58
923Cryptographic protocols / Internet protocols / Internet standards / Revocation list / Public key certificate / Online Certificate Status Protocol / Certificate authority / Warranty / X.509 / Cryptography / Public-key cryptography / Key management

InCommon Certificate Service Relying Party Standard Form Agreement 24 June[removed]InCommon Certificate Service Relying Party Agreement

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2011-01-21 13:18:06
924Internet standards / Public-key cryptography / Online Certificate Status Protocol / OCSP stapling / Revocation list / X.509 / SCVP / HTTP Secure / Public key certificate / Cryptography / Cryptographic protocols / Internet protocols

NIST Workshop: Improving Trust in the Online Marketplace

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-09 11:40:29
925Computing / Internet protocols / Internet standards / Cryptographic protocols / Routing protocols / Border Gateway Protocol / Online Certificate Status Protocol / X.509 / Revocation list / Cryptography / Internet / Public-key cryptography

Evaluating the Performance Impact of PKI on BGP Security Meiyuan Zhao∗and Sean W. Smith Department of Computer Science Dartmouth College David M. Nicol Department of Electrical and Computer Engineering

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 11:08:07
926Cryptographic protocols / Certificate policy / Revocation list / X.509 / Public key certificate / Public key infrastructure / Online Certificate Status Protocol / Certificate authority / Certificate signing request / Cryptography / Public-key cryptography / Key management

Controlled Substance Ordering System (CSOS) Certification Practices Statement (CPS) Prepared for Drug Enforcement Administration

Add to Reading List

Source URL: www.deaecom.gov

Language: English - Date: 2010-07-20 15:25:58
927Key management / Internet protocols / Internet standards / X.509 / Certificate Management Protocol / Public key infrastructure / Certificate authority / Public key certificate / PKCS / Cryptography / Public-key cryptography / Cryptographic protocols

2nd Annual PKI Research Workshop---Pre-Proceedings On the usefulness of proof-of-possession N. Asokan, Valtteri Niemi, Pekka Laitinen Nokia Research Center, Finland {n.asokan,valtteri.niemi,pekka.laitinen}@nokia.com

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-24 19:16:20
928Open formats / Web browsers / JSON / Digest access authentication / Representational state transfer / Application programming interface / Hypertext Transfer Protocol / Email / CouchDB / Computing / HTTP / Cryptographic protocols

Freedom Fone 2.S API Documentation Table of Contents Authentication ........................................................................................................................1 Restrict access.......

Add to Reading List

Source URL: www.freedomfone.org

Language: English - Date: 2012-02-27 08:20:08
929IP / Mathematics / NP / Valuation / Zero-knowledge proof / Cryptographic protocols / Applied mathematics / Proof of knowledge

Verifiable Mixing (Shuffling) of ElGamal Pairs C. Andrew Neff∗ April 21, 2004† Abstract We give an improved presentation of the protocol first published

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2004-04-21 21:18:47
930Cryptographic protocols / Internet standards / Public key infrastructure / Revocation list / X.509 / ID-based encryption / Online Certificate Status Protocol / SCVP / Public key certificate / Cryptography / Public-key cryptography / Key management

An Analysis of PKI Issues and Proposed Alternatives

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:13:10
UPDATE