Cryptography standards

Results: 2254



#Item
651Computer security / Cryptographic software / Virtual LAN / Critical Security Parameter / Password / FIPS 140 / HMAC / SHA-1 / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - 3e-636M-HSE FIPS Security Policy version 1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-11 11:28:45
652Cryptography standards / Markup languages / Security Assertion Markup Language / XML firewall / WS-Security / SOAP / JSON / Web service / XKMS / Computing / XML / Identity management

XML GATEWAY IDENTITY GATEWAY MOBILE GATEWAY

Add to Reading List

Source URL: www.forumsys.com

Language: English - Date: 2014-01-16 22:41:57
653Secure communication / Computing / Data / Internet standards / Electronic commerce / Transport Layer Security / Cipher suite / RC4 / Transmission Control Protocol / Cryptographic protocols / Internet protocols / Cryptography

Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:25:28
654National Institute of Standards and Technology / Cryptography standards / Thought / Ethics / National Accreditation Board for Testing and Calibration Laboratories / National Voluntary Laboratory Accreditation Program / Accreditation / Quality assurance / Evaluation

Preparation of Draft Scope of Accreditation Testing Laboratories Only The following information must accompany the Application for Accreditation to assist in preparation of the Scope of Accreditation. Using the format on

Add to Reading List

Source URL: anab.org

Language: English - Date: 2015-01-05 14:06:51
655Internet protocols / Secure communication / Computer network security / Internet standards / Transport Layer Security / Cipher suite / Key size / Public-key cryptography / Virtual private network / Cryptography / Cryptographic protocols / Computing

Microsoft PowerPoint - Caffery.pptx

Add to Reading List

Source URL: aths.org.au

Language: English - Date: 2014-07-23 01:32:54
656Computer security / Electronic commerce / Public key certificate / European Telecommunications Standards Institute / Service provider / Certificate policy / Electronic signature / Information security / Digital signature / Cryptography / Key management / Public-key cryptography

Final draft ETSI EN[removed]V1[removed]European Standard

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-11-08 09:35:32
657Public-key cryptography / CAdES / European Telecommunications Standards Institute / Time stamp protocol / Electronic signature / Digital signature / 3GPP / Public key certificate / PAdES / Cryptography / Cryptography standards / Key management

Final draft ETSI EN[removed]V0.0.0

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-01-15 09:16:42
658Secure communication / Public-key cryptography / Internet standards / Internet protocols / Transport Layer Security / HTTP Secure / X.509 / Proxy server / Certificate authority / Cryptography / Cryptographic protocols / Computing

TLS DONE LESS WRONG GRAHAM J. LEE [removed] 1. About the Author Graham is a software engineer and trainer at The Big Nerd Ranch. He has been

Add to Reading List

Source URL: www.securemacprogramming.com

Language: English - Date: 2013-07-16 06:19:44
659FIPS 140 / Debian / McAfee / Zeroisation / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Crypto++ / Cryptography / Cryptography standards / AES instruction set

FIPS[removed]Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-26 13:47:00
660Information / Cryptographic protocols / Cryptography standards / Radio-frequency identification / FIPS 140-2 / Public-key cryptography / Smart card / Communications protocol / Cryptographic engineering / Cryptography / Ubiquitous computing / Technology

4-4 R  esearches on Cryptographic Protocols — Standardization and Global Collaborations — MATSUO Shin’ichiro and OHKUBO Miyako Cryptography is fundamental technique to achieve security property in information sys

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:08:17
UPDATE