Cryptography standards

Results: 2254



#Item
241Cryptographic protocols / Internet protocols / Internet standards / Certificate policy / Revocation list / Public key certificate / X.509 / Certificate authority / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Certificate Policy and Practice Statement for the NCSA SLCS National Center for Supercomputing Applications (NCSA) Version 1.4 (Tue Apr 6 17:11:23 CDTContents 1

Add to Reading List

Source URL: security.ncsa.illinois.edu

Language: English - Date: 2010-04-06 18:16:23
242Internet / Cryptographic protocols / Public-key cryptography / Internet standards / HTTP / Network Time Protocol / Cryptographic hash function / HTTP cookie / X.509 / Cryptography / Computing / Internet protocols

Microsoft PowerPoint - secproto.ppt

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-10-31 14:46:23
243Secure communication / Computing / Internet protocols / Security / Internet standards / Transport Layer Security / Cipher suite / GnuTLS / HTTP Secure / Cryptography / Cryptographic protocols / Cryptographic software

2013 IEEE Symposium on Security and Privacy Implementing TLS with Verified Cryptographic Security Karthikeyan Bhargavan∗ , C´edric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , Pierre-Yves Strub‡ ∗ IN

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:46
244Cryptographic protocols / Internet protocols / Internet standards / Revocation list / Certificate policy / Online Certificate Status Protocol / Public key certificate / Certificate authority / X.509 / Cryptography / Public-key cryptography / Key management

CERTIFICATION PRACTICE STATEMENT SUPPORT OF OPENTRUST ELECTRONIC CERTIFICATION SERVICES Date:

Add to Reading List

Source URL: www.opentrust.com

Language: English - Date: 2015-06-17 04:55:04
245Cryptographic protocols / Computing / GnuTLS / Internet protocols / Secure communication / Internet standards / Comparison of TLS Implementations / TLS-SRP / Cryptographic software / System software / Cryptography

Introduction to GnuTLS Simon Josefsson http://josefsson.org/ http://www.gnutls.org/

Add to Reading List

Source URL: josefsson.org

Language: English - Date: 2012-09-11 01:52:01
246Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
247Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security

FortiToken -300 TM One-Time Password Token Strong Authentication at your Fingertips The FortiToken-300 product comprises a hardware token (FortiToken-300 PKI USB

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:10
248Checksum / NTFS / Information science / Computing / Hashing / Information retrieval / Cryptography / Search algorithms / Error detection and correction / Hash function

Jim  Lyle   National  Institute  of  Standards  and  Technology   Disclaimer    Certain  trade  names  and  company  products  are   mentioned  in  the  text

Add to Reading List

Source URL: www.cftt.nist.gov

Language: English - Date: 2010-09-16 15:17:26
249FIPS 140 / PKCS / Ciena / Critical Security Parameter / Cryptography standards / Cryptography / FIPS 140-2

Ciena Corporation Ciena 6500 Packet-Optical Platform 4x10G Hardware Version: 1.0 Firmware Version: 1.10 FIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:26:59
250Spamming / Steganography / Steganalysis / Graphics file formats / ISO standards / Digital watermarking / Email spam / JPEG / Spam / Cryptography / Espionage / Computing

1 Steganalysis by Subtractive Pixel Adjacency Matrix Tomáš Pevný and Patrick Bas and Jessica Fridrich, IEEE member Abstract—This paper presents a method for detection of

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2010-07-15 11:28:54
UPDATE