Cryptography standards

Results: 2254



#Item
331Cryptographic Module Testing Laboratory / Cryptographic Module Validation Program / Thought / Value / Change management / FIPS 140-3 / Cryptography standards / Evaluation / FIPS 140-2

<4D6963726F736F667420576F7264202D2043424D2D30332088C38D86838283578385815B838B8E8E8CB18B408AD68FB39446905C90BF8EE891B1939982C98AD682B782E98B4B92F62E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:19
332Internet protocols / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Dan Kaminsky / Name server / .dk / ICANN / Internet / Domain name system / Network architecture

DNSSEC Tutorial APNIC 30 Gold Coast, Australia 24 August 2010

Add to Reading List

Source URL: meetings.apnic.net

Language: English - Date: 2010-08-23 20:44:14
333Secure communication / HTTP / Internet standards / HTTP Secure / Transport Layer Security / Federal Trade Commission / Privacy policy / Internet privacy / X.509 / Cryptography / Public-key cryptography / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: d1ovv0c9tw0h0c.cloudfront.net

Language: English - Date: 2015-02-20 16:18:46
334Internet standards / Open standards / Pet sitting / Public-key cryptography / Internet protocols

DOC Document

Add to Reading List

Source URL: www.happytails-indy.com

Language: English - Date: 2015-04-20 16:27:27
335Public-key cryptography / Computing / Internet protocols / Internet standards / Resource Public Key Infrastructure / Border Gateway Protocol / Internet / Routing protocols / Network architecture

PDF Document

Add to Reading List

Source URL: meetings.apnic.net

Language: English - Date: 2011-08-30 20:38:43
336Network architecture / Internet protocols / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / DNS spoofing / Comparison of DNS server software / Domain name system / Internet / Computing

PDF Document

Add to Reading List

Source URL: www.appliansys.com

Language: English - Date: 2014-12-16 07:44:30
337Cryptography standards / Fill device / Electronic Key Management System / KSD-64 / NSA Suite B Cryptography / FIPS 140-2 / Cryptography / National Security Agency / Key management

Proteus Crypto Module High Assurance Suite A/B Cryptographic Module for Embedded Applications The Proteus Cryptographic Module (PCM) is ideal for programmable embedded applications that require minimal size,

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
338Secure communication / Computing / Data / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / TLS-PSK / Public-key cryptography / Cryptographic protocols / Cryptography / Internet protocols

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:39:13
339Information / Secure communication / Computing / Public-key cryptography / Internet standards / Cipher suite / TLS-PSK / Datagram Transport Layer Security / Trusted third party / Cryptographic protocols / Internet protocols / Data

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 12:09:04
340Crimes / ISO standards / Ubiquitous computing / Password / Two-factor authentication / Authentication / One-time password / Smart card / Credit card / Security / Computer security / Cryptography

PDF Document

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2012-02-29 13:44:30
UPDATE