Cryptography standards

Results: 2254



#Item
571European Telecommunications Standards Institute / Cryptographic Message Syntax / Electronic signature / Digital signature / PAdES / XAdES / Cryptography / Cryptography standards / CAdES

Final draft ETSI EN[removed]V0.0.0

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-02-16 11:55:46
572Aruba Networks / Technology / Network access / Electronic engineering / FIPS 140 / Wireless access point / Wireless LAN / Wi-Fi / Cryptography standards / Wireless networking / Computing

Dell W-AP92, W-AP93, W-AP104, W-AP105, and W-AP175 Wireless Access Points with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPS[removed]January 26, 2015 This is to advise that the Aruba Networks document entitle

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 14:10:38
573Data security / Cryptography standards / Computer network security / United States government secrecy / Security controls / FIPS 140-2 / Open Source Software Institute / OpenSSL / Global Information Assurance Certification / Security / Computer security / Computing

Global Information Assurance Certification Paper This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Copyright SANS Institute Author Retai

Add to Reading List

Source URL: www.oss-institute.org

Language: English - Date: 2012-10-17 10:57:26
574Computing / Internet / Public-key cryptography / Privacy of telecommunications / S/MIME / Secure messaging / Anti-spam techniques / Certificate authority / Secure communication / Cryptography / Internet privacy / Email

Simply Secure Email Glob@lCerts A Powerful, Standards-Based,

Add to Reading List

Source URL: www.globalcerts.net

Language: English - Date: 2012-01-30 18:55:05
575Security / ISO standards / FIPS 140-2 / Common Criteria / Protection Profile / Security Target / Evaluation Assurance Level / Accreditation / Cryptographic Module Testing Laboratory / Evaluation / Computer security / Cryptography standards

Accredited Laboratory Identification Code Date of first Accreditation Date of last Modification Name of Accredited Laboratory

Add to Reading List

Source URL: www.nite.go.jp

Language: English - Date: 2015-04-16 20:40:31
576Ubiquitous computing / FeliCa / Smart card / Near field communication / Advanced Encryption Standard / Data Encryption Standard / MIFARE / Contactless smart card / Cryptography / ISO standards / Technology

Contactless IC Card Chip RC-SA00 and RC-SA01 contactless IC chips support greatly-enhanced security with the addition of Advanced Encryption Standard (AES). RC-SA00 also supports Data Encryption Standard (DES)

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2014-03-20 07:51:11
577Internet protocols / Key management / Internet standards / Online Certificate Status Protocol / Revocation list / X.509 / OCSP stapling / Public key certificate / HTTP Secure / Cryptography / Public-key cryptography / Cryptographic protocols

Policy Manager - White Paper

Add to Reading List

Source URL: www.elock.com

Language: English
578Committees / Consultative Committee for Space Data Systems / Germany / Cryptography / Key size / German Aerospace Center / CCSDS 122.0-B-1 / XML Telemetric and Command Exchange / CCSDS / Science / Measurement

Recommendation for Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS RECOMMENDED STANDARD

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2012-11-15 20:57:43
579Public-key cryptography / Internet standards / Key management / Cryptographic protocols / Network Time Protocol / Transmission Control Protocol / IPsec / Domain Name System Security Extensions / Public key infrastructure / Cryptography / Internet protocols / Internet

1. Introduction A reliable distributed network service requires provisions to prevent accidental or malicious attacks on the servers and clients in the network. Reliability requires that clients can determine that receiv

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2000-05-21 14:04:30
580Internet standards / Key management / IBM Lotus Notes / NoSQL / IBM Lotus Domino / Lotus Software / X.509 / Key size / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Microsoft PowerPoint - ID218.ppt

Add to Reading List

Source URL: www.chc-3.com

Language: English - Date: 2007-02-22 11:20:52
UPDATE