Cryptography standards

Results: 2254



#Item
521Public key certificate / Certificate policy / X.509 / Revocation list / Certificate authority / European Telecommunications Standards Institute / Authorization certificate / CEN Workshop Agreement / Digital signature / Cryptography / Key management / Public-key cryptography

EN[removed]V1[removed]Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 3: Policy requirements for Certification Authorities issui

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-11-15 10:53:44
522Public key certificate / Certificate policy / Revocation list / European Telecommunications Standards Institute / X.509 / Certificate authority / CEN Workshop Agreement / Authorization certificate / CAdES / Cryptography / Key management / Public-key cryptography

EN[removed]V1[removed]Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 2: Policy requirements for certification authorities issuin

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-01-22 07:58:23
523Public key certificate / CA/Browser Forum / Certificate authority / X.509 / Extended Validation Certificate / Certificate policy / Revocation list / CEN Workshop Agreement / European Telecommunications Standards Institute / Cryptography / Key management / Public-key cryptography

EN[removed]V1[removed]Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 3: Policy Requirements for Certification Authorities issuin

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-03-30 07:30:42
524Email / Public-key cryptography / Internet standards / Internet privacy / Encryption / Transport Layer Security / Export of cryptography in the United States / Pretty Good Privacy / Cryptography / Internet / Computing

Encryption from a Human Rights Perspective The right to privacy as stated in Art. 12 UDHR not only protects against arbitrary interference with correspondence but also entitles to protection by law against such interfere

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:20
525Internet standards / Data / Computer networks / AS2 / Electronic commerce / Secure communication / CAcert.org / Edigas / AS1 / Cryptography / Cryptographic protocols / Computing

Press release Natural gas industry accepts CAcert CAcert is now officially accepted by the Edig@s work group as a trusted Certificate Authority (CA) for Electronic Data Interchange (EDI). This acceptance provides the bas

Add to Reading List

Source URL: svn.cacert.org

Language: English - Date: 2013-07-11 15:14:30
526Cryptographic protocols / Internet protocols / Internet standards / Virtual LAN / Online Certificate Status Protocol / IEEE 802.1 / X.509 / Revocation list / PKCS / Cryptography / Public-key cryptography / IEEE 802

 BorderGuard 6000 Enable Secure Communications 

Add to Reading List

Source URL: www.blueridge.com

Language: English - Date: 2013-03-13 16:27:36
527Cryptography / Computing / Data / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / HTTP Secure / RC4 / Cryptographic protocols / Secure communication / Internet protocols

[removed]This POODLE Bites: Exploiting The SSL 3.0 Fallback Page 1

Add to Reading List

Source URL: poodlebleed.com

Language: English - Date: 2014-10-15 00:08:45
528Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Configuration file / BIND / Internet / Internet protocols / Domain name system

SOFTWARE USER MANUAL (SUM): TRAINING, PROCEDURAL, AND DEVELOPMENT DOCUMENTATION DNSSEC-Tools Software User Manual Manual Pages

Add to Reading List

Source URL: www.dnssec-tools.org

Language: English - Date: 2014-09-18 01:15:15
529Cryptographic protocols / Internet protocols / Internet standards / Certificate policy / X.509 / Revocation list / Public key certificate / Public key infrastructure / Certificate authority / Cryptography / Public-key cryptography / Key management

VANguard Agency Certificate Policy (CP) 1 Introduction 1. This document, the VANguard Agency Certificate Policy (CP), sets out the rules

Add to Reading List

Source URL: vanguard.business.gov.au

Language: English - Date: 2015-02-03 21:59:59
530Public-key cryptography / Cryptographic software / Java Cryptography Architecture / Cryptography standards / Cryptography / Java / Keystore / PKCS / Computing / Java platform / Cross-platform software

Colorado Software Summit: October 26 – 31, 2003 © Copyright 2003, AudioAudit, Inc. Java Cryptography – Dealing with Practical Issues

Add to Reading List

Source URL: www.softwaresummit.com

Language: English - Date: 2008-01-03 04:10:59
UPDATE