Cryptography standards

Results: 2254



#Item
531Science / Computer security / Data security / Knowledge / Key management / Cryptography / Cryptography standards

Cryptographic Key Management Workshop Summary -- June 8-9, 2009

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 00:18:28
532Computing / Internet standards / Cryptographic protocols / Public-key cryptography / Network Time Protocol / Transport Layer Security / IPsec / Secure Shell / Network address translation / Internet protocols / Network architecture / Internet

Internet Engineering Task Force (IETF) Request for Comments: 5906 Category: Informational ISSN: [removed]B. Haberman, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-21 18:53:28
533Domain name system / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / /dev/random / BIND / Internet / Internet protocols / Network architecture

SOFTWARE USER MANUAL (SUM): TRAINING, PROCEDURAL, AND DEVELOPMENT DOCUMENTATION Step-by-Step DNS Security Operator Guidance Document (Version 1.0)

Add to Reading List

Source URL: www.dnssec-tools.org

Language: English - Date: 2014-09-18 01:15:17
534Network architecture / Internet standards / Computing / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Internet / Internet protocols / Domain name system

TM DNSSEC Practice Statement 8 January 2015

Add to Reading List

Source URL: www.nic.sucks

Language: English - Date: 2015-02-23 17:29:12
535Key management / Public-key cryptography / Electronic health record / Personal health record / Data mining / Cipher / Symmetric-key algorithm / Key / Key generation / Cryptography / International standards / Formal sciences

2014 Second International Conference on Advanced Cloud and Big Data Protecting and Analysing Health Care Data on Cloud Danan Thilakanathan∗† , Yu Zhao∗ , Shiping Chen∗† , Surya Nepal† , Rafael A. Calvo∗ an

Add to Reading List

Source URL: rafaelacalvo.files.wordpress.com

Language: English - Date: 2015-03-25 23:28:51
536Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / DNS spoofing / Name server / BIND / Internet / Domain name system / Internet protocols

Securing DNS by Deploying DNSSEC Steven Bonneville Manager – Linux Curriculum, Red Hat June 2010

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-07-06 11:48:56
537Public key certificate / CA/Browser Forum / Certificate authority / Extended Validation Certificate / X.509 / Transport Layer Security / Revocation list / Certificate policy / European Telecommunications Standards Institute / Cryptography / Key management / Public-key cryptography

TR[removed]V1[removed]Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on ETSI TS[removed]for Issuing Publicly-Trusted TLS/SSL Certificates

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-11-16 08:29:02
538Cryptographic protocols / Cryptography standards / Electronic commerce / Public key certificate / European Telecommunications Standards Institute / X.509 / Certificate policy / Authorization certificate / Revocation list / Cryptography / Key management / Public-key cryptography

EN[removed]V1[removed]Electronic Signatures and Infrastructures (ESI); Profiles for Trust Service Providers issuing certificates; Part 5: Extension for Qualified Certificate profile

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-01-31 09:02:20
539Public-key cryptography / XAdES / European Telecommunications Standards Institute / Public key certificate / XML / Electronic signature / Uniform resource identifier / Digital signature / CAdES / Cryptography / Cryptography standards / Key management

ETSI TS[removed]V1[removed]Technical Specification Electronic Signatures and Infrastructures (ESI); Trusted Lists

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-06-19 10:17:43
540United States government secrecy / Cryptography standards / National Information Assurance Partnership / Common Criteria / FIPS 140-2 / Information assurance / Information security / Committee on National Security Systems / National Security Agency / Computer security / Security / National security

FACT SHEET NSTISSP No. 11, Revised Fact Sheet National Information Assurance Acquisition Policy (Includes deferred compliance guidelines and procedures) July 2003

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
UPDATE