Cryptography standards

Results: 2254



#Item
231Quality / Public-key cryptography / Professional certification / ISO / Det Norske Veritas / Certification / Public key certificate / Standards / Evaluation / Quality management

Strålfors_AB_ISO_9001-2008_Certificate-MSC_1-13M5HRA_CC

Add to Reading List

Source URL: www.stralfors.se

Language: English - Date: 2015-04-14 10:01:24
232Cryptography standards / Computer network security / Data security / National security / FIPS 140-2 / Cloud computing / FIPS 201 / FIPS 140 / Security controls / Computer security / Security / Computing

Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1.  Opening Remarks 2.  The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV and PIV-I Us

Add to Reading List

Source URL: www.fips201.com

Language: English - Date: 2015-06-15 11:27:44
233Public-key cryptography / Standards / Bureau Veritas / Public key certificate / OHSAS 18001 / Business / Management / Technology / Quality management / Electronic commerce / Key management

Auditor 136107AuditorCertification Awarded to

Add to Reading List

Source URL: www.datarespons.com

Language: English - Date: 2015-03-03 05:33:33
234Ubiquitous computing / MIFARE / Randomness / Computing / Applied mathematics / Contactless smart card / Smart card / Card reader / Oyster card / Cryptography / Pseudorandom number generators / ISO standards

2013 IEEE Security and Privacy Workshops On Bad Randomness and Cloning of Contactless Payment and Building Smart Cards This work was supported by the European Commission under the FP7 project numberResilient Inf

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-05 16:04:56
235Identity management / Financial cryptography / ISO standards / Credential / MULTOS / Smart card / Authentication / Proof of knowledge / Blind signature / Cryptographic protocols / Cryptography / Security

Efficient Selective Disclosure on Smart Cards using Idemix? Pim Vullers1?? and Gergely Alp´ar1,2? ? ? 1 2

Add to Reading List

Source URL: www.cs.ru.nl

Language: English - Date: 2013-02-25 09:57:31
236Cryptographic hash functions / Hashing / Advanced Encryption Standard / Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Open Source Software Institute / SHA-2 / FIPS 140 / Cryptography / Cryptography standards / Cryptographic software

OpenSSL FIPS Object Module VersionBy the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: openssl.org

Language: English - Date: 2007-12-13 15:11:03
237Computing / Internet protocols / Internet / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / HTTP Secure / Public-key cryptography / Secure communication / Cryptographic protocols / Cryptography

TLS/SSL Securing your traffic 25 Security Workshop Fakrul Alam

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-01-07 14:15:34
238Internet protocols / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Dan Kaminsky / Zone file / Internet / Domain name system / Network architecture

DNSSEC Introduction Principles Deployment This document is a result of work by the Network Startup Resource Center (NSRC at http://nsrc.org). This document may be freely copied, modified, and otherwise re-used on the con

Add to Reading List

Source URL: nsrc.org

Language: English - Date: 2015-02-17 17:22:37
239Schoolteachers / Professional certification / Public key certificate / Fee / Knowledge / Standards / Public-key cryptography / Certified teacher

E-Certification, RA Agency: Budget Period: 350 Office of Superintendent of Public Instruction

Add to Reading List

Source URL: k12.wa.us

Language: English - Date: 2011-01-25 13:02:38
240Cryptographic protocols / Computer security / Internet standards / Secure communication / Transport Layer Security / Jericho Forum / De-perimeterisation / Advanced Encryption Standard / Public-key cryptography / Cryptography / Data security / Security

Microsoft Word - Contents Thesis 1.10.doc

Add to Reading List

Source URL: www.few.vu.nl

Language: English - Date: 2015-06-15 16:32:20
UPDATE