Cryptography standards

Results: 2254



#Item
301Internet protocols / Internet standards / Online Certificate Status Protocol / Revocation list / X.509 / Lightweight Directory Access Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Using Dirmngr for version 1.0.2, 31 July 2008 Steffen Hansen () Werner Koch ()

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2008-07-31 08:03:50
302Key management / Public key certificate / Public-key cryptography / Product certification / Chair / Professional certification / Management / Form / Ethics / Standards / Quality / Electronic commerce

The Furntech-AFRDI Blue Tick Fixed Height Chairs & Seating List Certified fixed height chairs (including Rated Load chairs) The following products have been found to comply with the certification requirements and

Add to Reading List

Source URL: www.furntech.org.au

Language: English - Date: 2015-05-25 23:47:08
303Key management / Cryptographic protocols / Internet standards / PKI Resource Query Protocol / X.509 / Public key infrastructure / SCVP / Online Certificate Status Protocol / Public key certificate / Cryptography / Public-key cryptography / Internet protocols

Journal of Computer Security–420 DOIJCSIOS Press 397

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-12 10:13:55
304Routing protocols / Public-key cryptography / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Digital signature / Convergence / RSA / Internet / Network architecture / Computing

Simulation Modelling Practice and Theory–216 www.elsevier.com/locate/simpat Evaluation of efficient security for BGP route announcements using parallel simulation David M. Nicol

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:44:25
305Cryptographic protocols / Internet protocols / Internet standards / X.509 / Revocation list / Public key certificate / Certificate policy / Public key infrastructure / Self-signed certificate / Cryptography / Key management / Public-key cryptography

Managing Interoperability in Non-Hierarchical Public Key Infrastructures Peter M. Hesse Gemini Security Solutions 1

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-26 10:12:32
306Cryptographic protocols / Electronic commerce / Internet standards / Extended Validation Certificate / Public key certificate / X.509 / Certificate policy / CA/Browser Forum / Revocation list / Cryptography / Key management / Public-key cryptography

WoSign eCommerce Services Limited 502#, Block A, Technology Building 2, No. 1057, Nanhai Blvd. Nanshan District, Shenzhen, China Tel: +Fax: +

Add to Reading List

Source URL: www.wosign.com

Language: English - Date: 2013-04-02 10:40:00
307Electronic commerce / Security / Cyberwarfare / Computing / Internet standards / Public key certificate / X.509 / Self-signed certificate / Certificate authority / Public-key cryptography / Key management / Cryptographic protocols

Using TLS with Radmind VersionThis document describes how to configure and use certificates for the radmind client and server. Creating a Certificate Authority

Add to Reading List

Source URL: rsug.itd.umich.edu

Language: English - Date: 2005-08-18 16:57:37
308FIPS 140 / Critical Security Parameter / Password / Zeroisation / USB flash drive / Computing / Cyberwarfare / Microsoft CryptoAPI / Cryptography standards / Computer security / FIPS 140-2

Microsoft WordSanDisk Security Policy v1.12 - changes accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-10-16 01:00:00
309PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:08:56
310Randomness / Pseudorandom number generators / Cryptography standards / Random number generation / Pseudorandomness / FIPS 140-2 / Algorithm / Cryptographically secure pseudorandom number generator / CRYPTREC / Cryptography / Theoretical computer science / Applied mathematics

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Random Number Generators —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
UPDATE