Cryptography standards

Results: 2254



#Item
561PAdES / XAdES / CAdES / European Telecommunications Standards Institute / PDF/A / Electronic signature / Portable Document Format / XML Signature / XML / Cryptography / Cryptography standards / Computing

Final draft ETSI EN[removed]V0.0.0

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-02-16 06:28:18
562Internet protocols / Cryptographic protocols / Internet standards / Transport Layer Security / Public key certificate / DigiCert / SSL acceleration / HTTP Secure / Cryptography / Secure communication / Electronic commerce

SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc.

Add to Reading List

Source URL: community.qualys.com

Language: English - Date: 2015-02-09 23:07:14
563Cryptographic protocols / Internet protocols / Internet standards / X.509 / Public key certificate / Authorization certificate / Certificate policy / Revocation list / Lightweight Directory Access Protocol / Cryptography / Public-key cryptography / Key management

Draft ETSI EN[removed]V2[removed]European Standard Electronic Signatures and Infrastructures (ESI); Certificate Profiles;

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-01-15 09:16:52
564Key management / Public-key cryptography / European Telecommunications Standards Institute / Electronic signature / Public key certificate / Digital signature / European Committee for Standardization / Common technical regulation / XML Signature / Cryptography / Cryptography standards / Standards organizations

ETSI TR[removed]V0[removed]TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); Rationalised structure for Electronic Signature Standardisation

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2014-02-07 08:52:12
565Open formats / Electronics / XAdES / CAdES / OpenDocument / European Telecommunications Standards Institute / Application-specific integrated circuit / EPUB / Containerization / Cryptography standards / Computing / Computer file formats

Final draft ETSI EN[removed]V0.0.0

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-02-19 10:07:43
566Internet standards / Security / Internet / WS-Security / Transport Layer Security / HTTP Secure / Cryptography / Public-key cryptography / Dynamic SSL / Computing / Cryptographic protocols / Secure communication

Colorado Software Summit: October 21 – 26, 2007 © Copyright 2007, Perficient, Inc. Web Services Security

Add to Reading List

Source URL: www.softwaresummit.com

Language: English - Date: 2008-04-03 21:12:14
567Aruba Networks / Electronic engineering / FIPS 140 / Wireless LAN / Power over Ethernet / Wi-Fi / Wireless access point / Cryptography standards / Computing / Technology

Dell W-IAP155 and W-IAP155P Wireless Access Points with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPS[removed]January 26, 2015 This is to advise that the Aruba Networks document entitled “FIPS[removed]Non-Pro

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 14:10:11
568Public key certificate / Electronic engineering / Common technical regulation / European Committee for Standardization / Digital Enhanced Cordless Telecommunications / Technology / Electronics / PAdES / CAdES / Standards organizations / Cryptography standards / European Telecommunications Standards Institute

Draft ETSI EN[removed]V0.0.2

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-01-15 09:16:53
569Certificate policy / Public key certificate / Public key infrastructure / X.509 / Revocation list / Certificate authority / European Telecommunications Standards Institute / Cryptography / Key management / Public-key cryptography

ETSI TR[removed]V1[removed]Technical Report Electronic Signatures and Infrastructures (ESI); Mapping Comparison Matrix between the US Federal Bridge CA Certificate Policy and

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2006-04-20 05:18:26
570EMV / ISO standards / Ubiquitous computing / Public-key cryptography / Smart card / Hardware security module / Credit card / Payment card / Automated teller machine / Cryptography / Technology / Payment systems

White Paper EMV Key Management – Explained EMV Key Management

Add to Reading List

Source URL: www.cryptomathic.com

Language: English - Date: 2013-03-25 07:55:19
UPDATE