Cryptography standards

Results: 2254



#Item
671Secure communication / Electronic commerce / Internet standards / Transport Layer Security / HTTP Secure / Public key certificate / Man-in-the-middle attack / Dynamic SSL / Proxy server / Cryptography / Cryptographic protocols / Public-key cryptography

SSL – does it provide the security that users believe?

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:51:00
672Cryptographic software / Internet privacy / Email authentication / X.509 / Email encryption / Key management / Password / Pretty Good Privacy / Web of trust / Cryptography / Public-key cryptography / PGP

FileAssurity OpenPGP Encrypt and digitally sign your files, folders, documents, instant messages and emails. Securely delete them beyond US DOD standards. Communicate securely with PGP v5.x+ or any other OpenPGP user. Pr

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 12:53:06
673Advanced Encryption Standard / Algorithm / Applied mathematics / Mathematics / Computer security / Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2

March 3, 2015 Dear CST Laboratories, Thank you for your feedback concerning the addition of cryptographic algorithm testing information to the CAVS tool’s vendor/implementation information page. This additional cryptog

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 08:24:36
674PKCS11 / PKCS / Dynamic-link library / Hardware security module / X.509 / Security token / Data security / Library / RSA / Cryptography / Cryptography standards / Public-key cryptography

Ingenieurbüro David Fischer AG | A Company of the Apica Group http://www.proxy-sniffer.com Using PKCS#11 Security Devices for Recording Web Surfing Sessions and for Executing Web Load Tests

Add to Reading List

Source URL: www.apicasystem.com

Language: English - Date: 2014-07-03 02:44:10
675Adobe LiveCycle / Adobe software / Electronic documents / ISO standards / Technical communication tools / Adobe LiveCycle Designer / Adobe LiveCycle Reader Extensions / Software / Computing / Cryptography

Datasheet ADOBE® LiveCycle® Digital Signatures ES Integrate digitally signed, certified, and validated PDF documents

Add to Reading List

Source URL: www.evolutionbook.it

Language: English - Date: 2012-07-09 11:18:29
676Secure communication / Data / Computing / Internet standards / Electronic commerce / Transport Layer Security / European Telecommunications Standards Institute / UICC / Subscriber identity module / Cryptographic protocols / Cryptography / Internet protocols

TS[removed]V1[removed]Security solutions

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-18 05:23:25
677Computer network security / Computer security / Cryptography standards / Secure communication / CRYPTREC / Cryptography / Information security / Network security / National Security Agency / Security / Crime prevention / National security

Network Security Research Institute Organization of the Network Security Research Institute, NICT NICT

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2014-08-13 01:28:32
678Cryptography / Smart card / Advanced Encryption Standard / Technology / Computing / MIFARE / Ubiquitous computing / ISO standards / Contactless smart card

LA-11-006f-en[removed]advant advanced contactless smart card system

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2012-07-10 06:09:35
679PAdES / Computer file formats / Open formats / Electronic documents / CAdES / XAdES / European Telecommunications Standards Institute / Cryptographic Message Syntax / Electronic signature / Cryptography / Computing / Cryptography standards

Final draft ETSI EN[removed]V0.0.0

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-02-16 06:28:19
680Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
UPDATE