Cryptography standards

Results: 2254



#Item
261Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security

FortiToken -300 TM One-Time Password Token Strong Authentication at your Fingertips The FortiToken-300 product comprises a hardware token (FortiToken-300 PKI USB

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:10
262Ubiquitous computing / Computing / Cryptography / Card reader / USB / ISO/IEC / Microsoft CryptoAPI / Biometrics / Contactless smart card / Smart cards / Security / ISO standards

Microsoft Word - Privaris_Partner Programdoc

Add to Reading List

Source URL: www.privaris.com

Language: English - Date: 2008-03-16 22:09:31
263Graphics file formats / Steganalysis / Computer file formats / ISO standards / JPEG / Digital watermarking / Yass / Jessica Fridrich / Quantization / Cryptography / Espionage / Steganography

Modern Steganalysis Can Detect YASS Jan Kodovskýa , Tomáš Pevnýb ∗, Jessica Fridricha †, a Department of Electrical and Computer Engineering, Binghamton University, State University of New York

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2009-11-28 18:47:02
264Routing protocols / Routing / Internet standards / Public-key cryptography / Resource Public Key Infrastructure / Internet protocols / Border Gateway Protocol / IP hijacking / IP address / Network architecture / Internet / Computing

On the Risk of Misbehaving RPKI Authorities Ethan Heilman* Kyle Brogle† Leonid Reyzin* Sharon Goldberg* ∗

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2013-11-05 16:34:01
265FIPS 140-2 / FIPS 140 / Cryptographic software / Data Encryption Standard / Zeroisation / Internet Key Exchange / Key Wrap / AES implementations / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 206k - µMACE_Security_Policy R010706 - MotApprovaed.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 07:39:47
266FIPS 140 / Advanced Encryption Standard / Critical Security Parameter / Key management / Microsoft CryptoAPI / Security of automated teller machines / Cryptography standards / Cryptography / FIPS 140-2

TIDSecurityPolicy (Apricorn_15.04.10_V1.19)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:17:10
267Data security / Data / Computer security / Encryption / McAfee / Data loss / Check Point / Data loss prevention software / Computing / Cryptography / Data management

Wave Data Protection Suite Complete Visibility, Control and Protection Adhere to regulatory data security and privacy standards Maintain optimal balance

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:08:54
268Internet protocols / Computing / Internet / Cryptographic software / Internet standards / Transport Layer Security / HTTP Secure / Cipher suite / OpenSSL / Cryptography / Secure communication / Cryptographic protocols

Preface You are about to undertake a journey into the mysterious world of cryptography. I’ve just completed mine—writing this book—and it’s been an amazing experience. Although I’d been a user of SSL since its

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-08 18:16:46
269Graphics file formats / Steganalysis / ISO standards / JPEG / Quantization / Jessica Fridrich / Cryptography / Espionage / Steganography

Practical Steganalysis of Digital Images – State of the Art Jessica Fridrich*, Miroslav Goljan SUNY Binghamton, Department of Electrical Engineering, Binghamton, NYABSTRACT Steganography is the art of hidin

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2006-04-26 08:10:43
270Cryptographic protocols / Cryptography standards / Electronic commerce / X.509 / Public key certificate / Certificate authority / PKCS12 / PKCS / HTTP Secure / Cryptography / Public-key cryptography / Key management

Microsoft Word - handouts-get-a-cert-LCGdoc

Add to Reading List

Source URL: certificate.nikhef.nl

Language: English - Date: 2006-07-27 08:52:10
UPDATE