Cryptography standards

Results: 2254



#Item
721Mobile telecommunications / Identity management / ISO standards / Ubiquitous computing / Smart cards / Electronic identity card / Mobile payment / Two-factor authentication / Identity document / Technology / Cryptography / Security

GOVERNMENT PROGRAMS WHITE PAPER National Mobile ID schemes Volume I

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-02-20 12:42:02
722Internet / Computing / Internet protocols / Internet standards / HTTP / HTTP Secure / HTTP cookie / Man-in-the-middle attack / Certificate authority / Cryptography / Cryptographic protocols / Secure communication

Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Michael Dietz Rice University Alexei Czeskis

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-03-21 17:06:14
723Public-key cryptography / Standards / Code of Federal Regulations / Electronic commerce / Key management / Public key certificate

Applicable Standards and Requirements for Vessels under the National System

Add to Reading List

Source URL: www.amsa.gov.au

Language: English - Date: 2015-02-23 21:56:35
724Internet protocols / Network architecture / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Email / DNS spoofing / Dynamic DNS / Internet / Domain name system / Computing

SMĀ  DNSSEC Deployment:! Relevance for End-Users James M. Galvin, Ph.D. Director Strategic Relationships

Add to Reading List

Source URL: www.inethk.asia

Language: English - Date: 2010-05-06 07:41:42
725Computer security / Cryptographic hash functions / OpenSSL / Open Source Software Institute / FIPS 140-2 / FIPS 140 / SHA-1 / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic software

OpenSSL FIPS Object Module Version[removed]By the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: openssl.org

Language: English - Date: 2007-02-06 16:03:20
726Cryptographic protocols / Secure communication / Internet standards / Man-in-the-middle attack / Transport Layer Security / Certificate authority / HTTP Secure / X.509 / Public key certificate / Cryptography / Public-key cryptography / Key management

! ! DNSChain + okTurtles ! Easy to use, state of the art security, for existing online communications!

Add to Reading List

Source URL: okturtles.com

Language: English - Date: 2014-04-26 16:43:54
727Internet protocols / Internet standards / Key management / Revocation list / Online Certificate Status Protocol / X.509 / Lightweight Directory Access Protocol / Public key certificate / OpenLDAP / Cryptography / Public-key cryptography / Cryptographic protocols

Proceedings of the 2005 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY A New On-line Certificate Validation Method using LDAP Component Matching Technology

Add to Reading List

Source URL: www.openldap.org

Language: English - Date: 2014-09-29 17:45:14
728Cryptographic protocols / Electronic commerce / Internet protocols / Public-key cryptography / Transport Layer Security / AS2 / X.509 / RC4 / Public key certificate / Cryptography / Computing / Internet standards

SOLUTION VIEW Secure, Automated eTransfer

Add to Reading List

Source URL: www.cticomm.com

Language: English - Date: 2015-01-04 00:00:51
729Security / Internet standards / Key management / Public-key cryptography / Password / Transport Layer Security / HTTP Secure / Certificate authority / SHA-2 / Cryptography / Cryptographic protocols / Secure communication

Woman looking into distance whilst thinking

Add to Reading List

Source URL: www.hkitssm.org

Language: English - Date: 2014-07-02 22:46:22
730Public-key cryptography / Data security / Cryptography standards / Information security / FIPS 140-2 / Domain Name System Security Extensions / Federal Information Security Management Act / Key size / Public key infrastructure / Cryptography / Computer security / Key management

NIST SP[removed]Part 3 Rev. 1, Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-01-26 16:58:52
UPDATE