Cryptography standards

Results: 2254



#Item
691Cryptography / UICC configuration / UICC / Subscriber identity module / GlobalPlatform / Smart card application protocol data unit / Java Card / European Telecommunications Standards Institute / Smart card / Smart cards / Security / Espionage

TS[removed]V12[removed]Smart Cards; Remote APDU structure for UICC based applications (Release 12)

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-19 09:07:40
692Ubiquitous computing / Access control / Smart cards / Security token / Biometrics / Identity document / Authentication / Public key infrastructure / Contactless smart card / Security / Cryptography / ISO standards

LC Paper No. CB[removed]) Response to the Legislative Council Brief on the New Hong Kong Identity Card Dit-Yan Yeung (楊瓞仁) Associate Professor Department of Computer Science School of Engineering

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2005-08-10 22:42:42
693Cryptographic software / Cryptographic hash functions / X86 architecture / Hashing / Cryptography standards / OpenSSL / SHA-2 / AES instruction set / FIPS 140-2 / Cryptography / Computer architecture / Error detection and correction

ODT Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2014-11-25 17:47:07
694Cryptography standards / Markup languages / Security Assertion Markup Language / XML firewall / WS-Security / SOAP / JSON / Web service / XKMS / Computing / XML / Identity management

XML GATEWAY IDENTITY GATEWAY MOBILE GATEWAY

Add to Reading List

Source URL: www.forumsys.com

Language: English - Date: 2014-01-10 11:22:17
695Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
696Cryptographic hash functions / Computing / FIPS 140 / Cryptographic software / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptography standards

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-06 07:32:08
697Zebra Technologies / FIPS 140-2 / Nvidia Ion / Trusted computing / Security / Cryptography / Cryptography standards / Computer security / Radio-frequency identification

Microsoft Word - 213e - SecurityPolicy WM-CE.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-10 11:56:21
698Public-key cryptography / Electronic commerce / Key management / Public key certificate

GOVERNMENT NOTICE NO. 672 published on[removed]THE STANDARDS ACT, 1975 (No. 3 of[removed]REGULATIONS Made under section 31 THE STANDARDS (COMPULSORY BATCH CERTIFICATION OF IMPORTS)

Add to Reading List

Source URL: tanzania.go.tz

Language: English - Date: 2014-11-12 06:49:51
699Internet standards / Cryptography standards / Secure communication / PKCS / Network Security Services / Padding / MD5 / RSA / Sizeof / Cryptography / Public-key cryptography / Electronic commerce

Intel Security: Advanced Threat Research BERserk Vulnerability Part 2: Certificate Forgery in Mozilla NSS October 6, 2014

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2014-10-06 18:24:36
700Computer security / FIPS 140-2 / FIPS 140 / Side channel attack / Tamper resistance / Power analysis / Field-programmable gate array / CRYPTREC / FIPS 140-3 / Cryptography standards / Cryptography / Espionage

Report for Tamper-Resistance Standardization Research Committee

Add to Reading List

Source URL: www.jsa.or.jp

Language: English - Date: 2006-10-09 22:25:29
UPDATE