Cryptography standards

Results: 2254



#Item
341Internet protocols / Internet standards / Cryptographic protocols / Key derivation function / PBKDF2 / Online Certificate Status Protocol / Digital signature / Password / Steganography / Cryptography / Key management / Public-key cryptography

Security  Highlights   The  IBM  Mobile  Iden7ty  framework  has  embraced  several  industry  standards  to  allow  applica7on   developers  to  create  secure  s

Add to Reading List

Source URL: www-01.ibm.com

Language: English - Date: 2014-11-20 11:27:30
342Ubiquitous computing / Public-key cryptography / Identity document / Resident registration / Smart card / Public key certificate / EGovernment in Europe / Cryptography / Security / ISO standards

The Local Government Wide Area Network (LGWAN), which is an administration-dedicated network connecting local governments, was connected with the intranets of prefectures and ordinance-designated cities in October 2001 a

Add to Reading List

Source URL: www.soumu.go.jp

Language: English - Date: 2009-10-02 11:39:29
343Internet protocols / Internet standards / Cryptographic protocols / Transport Layer Security / Public key certificate / DigiCert / SSL acceleration / FTPS / Cryptography / Secure communication / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2013-07-30 16:30:53
344FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Cryptographic Module Validation Program / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / Computer security

FIPSValidation Certificate No. 1010

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 22:02:12
345FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Key Wrap / National Voluntary Laboratory Accreditation Program / Cryptographic Module Testing Laboratory / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Computer security

FIPSValidation Certificate No. 1012

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 22:00:42
346Network architecture / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Hardware security module / .nl / OpenDNSSEC / Internet / Domain name system / Internet protocols

PDF Document

Add to Reading List

Source URL: www.sidn.nl

Language: English - Date: 2015-02-17 07:49:08
347Dual EC DRBG / National Institute of Standards and Technology / National Security Agency / Factorial / Blum Blum Shub / RBG / One-way function / Mathematics / Pseudorandom number generators / Cryptography

. The Dual Elliptic Curve Deterministic RBG . Background, Specification, Security and Notes

Add to Reading List

Source URL: www.untruth.org

Language: English - Date: 2013-06-22 03:51:50
348Emerging technologies / European Telecommunications Standards Institute / ISO standards / CAdES / Smart grid / Machine-to-Machine / Smart city / Near field communication / 3GPP / Technology / Cryptography standards / Standards organizations

TRV1Machine-to-Machine communications (M2M); Impact of Smart City Activity on IoT Environment

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-04-28 09:15:21
349Cryptographic protocols / Internet protocols / Internet standards / X.509 / Public key certificate / Public key infrastructure / Certificate authority / X.500 / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Key management

ReportThe Internet Infrastructure Foundation Kirei 2011:19

Add to Reading List

Source URL: www.iis.se

Language: English - Date: 2013-09-02 04:02:13
350FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Cryptographic Module Testing Laboratory / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Computer security

FIPSValidation Certificate No. 1002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 22:09:31
UPDATE