Cryptography standards

Results: 2254



#Item
701Internet protocols / Cryptographic protocols / Data / Computer network security / Technical terminology / Extensible Threat Management / FIPS 140 / HMAC / Transport Layer Security / Computing / Cryptography / Cryptography standards

FIPS[removed]Security Policy for WatchGuard XTM XTM 850, XTM 860, XTM 870, XTM 870-F XTM 1520, XTM 1525

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 15:05:01
702Security / FIPS 140 / Critical Security Parameter / Trusted Computing Group / Trusted Computing / Zeroisation / Authentication / SAS / Hitachi Global Storage Technologies / Cryptography / Computer security / Cryptography standards

Microsoft Word - 9k - Security Policy CBF.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 14:10:38
703Elliptic curve cryptography / Elliptic curve / Curve / Mathematics / Finite fields / Cryptography

Call For Papers - NIST Workshop on Elliptic Curve Cryptography Standards (June 2015)

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-01-15 12:54:38
704Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
705Digital Cinema Initiatives / Digital cinema / Quality assurance / FIPS 140-2 / FIPS 140 / Technology / Digital media / Cryptography standards / Media technology

Microsoft Word - DCI-Aegisolve Press Release.final.doc

Add to Reading List

Source URL: www.dcimovies.com

Language: English - Date: 2012-01-25 23:22:45
706Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Resolver / DNS spoofing / Name server / Domain name system / Internet / Internet protocols

The Resolvers We Use Geoff Huston APNIC     One of those wtf moments… This  figure  was  produced  as  part  

Add to Reading List

Source URL: labs.apnic.net

Language: English - Date: 2015-03-02 19:08:37
707Public-key cryptography / Network architecture / Key management / Internet standards / Computing / Domain Name System Security Extensions / OpenDNSSEC / Internet / Domain name system / Internet protocols

The Evolution of DNSSEC’s Global Rollout Eric Osterweil What is DNSSEC Good For?   The DNS is a core Internet protocol that maps names to

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English
708Internet standards / Information / Internet protocols / Time / X.509 / Online Certificate Status Protocol / Object identifier / Timestamp / Cryptographic Message Syntax / Cryptographic protocols / Cryptography / Public-key cryptography

Public document Representing Digital Signatures Using the CMS (Cryptographic Message Syntax) Format VersionAnnotation

Add to Reading List

Source URL: www.timestamp.cyber.ee

Language: English - Date: 2003-01-29 09:32:11
709Information technology / Holism / Modularity / Cryptography standards

Form 20 VersionHeriot-Watt University - Module Descriptor Template (RAY)

Add to Reading List

Source URL: www.macs.hw.ac.uk

Language: English - Date: 2009-11-11 10:08:18
710Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / OpenDNSSEC / DNS spoofing / Domain name system / Internet / Internet protocols

DNSSEC in NL final report R. Gieben version: 1.1.0

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:49
UPDATE