Cryptography standards

Results: 2254



#Item
371Web services / XML / Padlock / World Wide Web Consortium / Canonicalization / Phishing / Computing / Cryptography standards / Web development

Web Security Challenges World Wide Web Conference 2006 Thomas Roessler, W3C

Add to Reading List

Source URL: www.w3.org

Language: English
372Public-key cryptography / Garda Emergency Response Unit / International relations / Law / Medical informatics / International standards / Personal health record

Maejo Int. J. Sci. Technol. 2015, 9(01), Maejo International Journal of Science and Technology ISSNAvailable online at www.mijst.mju.ac.th

Add to Reading List

Source URL: www.mijst.mju.ac.th

Language: English - Date: 2015-04-08 23:11:13
373Internet privacy / Public-key cryptography / Email authentication / Internet standards / PGP / Password / Pretty Good Privacy / Email / Transport Layer Security / Cryptography / Internet / Computing

Using Formstack to Safely Capture More Responses in Higher Education Efficiency & Security

Add to Reading List

Source URL: www.formstack.com

Language: English - Date: 2015-05-08 10:40:00
374Trusted Computing Group / Trusted Platform Module / Standards / Standards organization / Standardization / Interoperability / Computer security / Trusted computing / Cryptography

Trusted Computing Standards Overview Mike Boyle IAD Technical Lead for Standards

Add to Reading List

Source URL: scap.nist.gov

Language: English
375Regional Internet Registries / Routing protocols / Internet protocols / Internet standards / Public-key cryptography / NLnet / Border Gateway Protocol / Resource Public Key Infrastructure / Asia-Pacific Network Information Centre / Internet / Network architecture / Computing

Internet  Rou*ng  Security:   What’s  Next?   Benno  Overeinder   NLnet  Labs   http://www.nlnetlabs.nl/

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-01-18 09:16:13
376Computing / Internet protocols / Internet standards / Public-key cryptography / Routing protocols / Domain Name System Security Extensions / NLnet / Unbound / NSD / Internet / Network architecture / Domain name system

Annual Report 2010 Colophon This document was prepared with LibreOffice software using the OpenDocument file format. The front page, NSD, and Unbound logo were created using Blender.

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2011-05-30 09:47:21
377Smart cards / Cryptographic software / Windows XP / PKCS / Firefox / Windows / Microsoft CryptoAPI / Netscape / Two-factor authentication / Software / Microsoft Windows / Cryptography standards

Rosetta Common Services Interface™ Version 6.0 Rosetta Common Services Interface (Rosetta CSI™), the software component of Rosetta Executive Suite™, provides utilities for managing security devices, certificates, a

Add to Reading List

Source URL: autonomicresources.com

Language: English - Date: 2012-12-12 15:19:13
378Secure communication / Internet standards / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Elliptic curve Diffie–Hellman / X.509 / Public-key cryptography / Key / Cryptography / Cryptographic protocols / Internet protocols

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2006-05-16 18:05:25
379Computing / Network architecture / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Council of European National Top Level Domain Registries / NSD / Internet / Internet protocols / Domain name system

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
380Key management / Internet standards / Internet protocols / Wireless Transport Layer Security / X.509 / Certificate authority / Public key certificate / Transport Layer Security / Self-signed certificate / Cryptography / Public-key cryptography / Cryptographic protocols

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:51
UPDATE