Cryptography standards

Results: 2254



#Item
321Network architecture / Domain name system / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Peer-to-peer / Lookup / Debian / Computing / Internet protocols / Internet

Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
322Internet protocols / Internet standards / Private information retrieval / Coprocessor / Trusted Computing / Information privacy / Internet privacy / Lightweight Directory Access Protocol / Privacy / Cryptography / Ethics / Computing

Trusted Computing Protecting Client Privacy with Trusted Computing at the Server Current trusted-computing initiatives usually involve large

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:24:54
323Cryptographic Module Testing Laboratory / FIPS 140-2 / Cryptographic Module Validation Program / Public key certificate / Ethics / National Accreditation Board for Testing and Calibration Laboratories / Cryptography standards / Evaluation / Computer security

<4D6963726F736F667420576F7264202D2043424D2D3031422088C38D86838283578385815B838B8E8E8CB18B408AD68FB394468BC696B18EE688B58EE88F872E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:44
324Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-07-20 15:18:58
325Cryptographic protocols / Public-key cryptography / Key management / PKI Resource Query Protocol / Online Certificate Status Protocol / SCVP / Public key infrastructure / Dynamic Host Configuration Protocol / X.509 / Cryptography / Internet protocols / Internet standards

AutoPKI: a PKI Resources Discovery System? Massimiliano Pala and Sean W. Smith Dartmouth College, Computer Science Department, 6211 Sudikoff, Hanover, NH 03755, US {pala,sws}@cs.dartmouth.edu http://www.cs.dartmouth.edu

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-04-29 13:13:22
326Network architecture / Internet protocols / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / NLnet / Unbound / NSD / Internet / Domain name system / Computing

DNS at NLnet Labs Matthijs Mekking Topics • NLnet Labs

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2010-08-05 05:56:38
327Security / Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Public key fingerprint / Public-key cryptography / Authentication / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CAbalfanz,smetters,stewa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:13:47
328Electronic commerce / FIPS 140-2 / FIPS 140 / RSA / Digital cinema / Cryptography / Cryptography standards / Public-key cryptography

Microsoft Word - Bulletin on FIPS-NISTdoc

Add to Reading List

Source URL: www.dcimovies.com

Language: English - Date: 2010-11-15 19:02:24
329Quality / Validity / Evaluation / Security / FIPS 140-2 / Verification and validation / Internal audit / Public key certificate / Validation / Cryptography / Cryptography standards / Pharmaceutical industry

<4D6963726F736F667420576F7264202D2043424D2D30312088C38D86838283578385815B838B94468FD88B408AD682CC916790448B7982D18BC696B1895E896382C98AD682B782E98B4B92F62E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:32
330Internet protocols / Cryptographic protocols / Internet standards / PKI Resource Query Protocol / Public key infrastructure / X.509 / Revocation list / Certificate authority / Certificate policy / Cryptography / Public-key cryptography / Key management

Extending PKI Interoperability in Computational Grids Massimiliano Pala∗ , Shreyas Cholia† , Scott A. Rea∗ , Sean W. Smith∗ ∗ †

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English
UPDATE