Cryptography standards

Results: 2254



#Item
781Key management / Public-key cryptography / Det Norske Veritas / Professional certification / ISO / Public key certificate / Academic certificate / Management / Education / Quality management / Quality / Standards

DNV BUSINESS ASSURANCE MANAGEMENT SYSTEM CERTIFICATE Certificate No. CERT[removed]AQ-HOU-RvA This is to certify that Flexco

Add to Reading List

Source URL: www.flexco.com

Language: English
782Markup languages / Cryptography standards / Technical communication / Functional languages / XSLT / EXist / Microsoft SQL Server / XPath 1.0 / XML Certification Program / Computing / Web standards / XML

University of Huddersfield Repository Lu, Joan and Cripps, Nathan XML Security in Certificate Management - XML Certificator Original Citation Lu, Joan and Cripps, Nathan[removed]XML Security in Certificate Management - XM

Add to Reading List

Source URL: eprints.hud.ac.uk

Language: English - Date: 2010-12-09 14:38:39
783Internet protocols / Internet standards / Cryptography standards / XKMS / X.509 / Delegated Path Discovery / Lightweight Directory Access Protocol / PKCS / Authentication / Cryptography / Cryptographic protocols / Public-key cryptography

7 May 7, 2003 Comments from Denis Pinkas ([removed]) on XKMS Version 2 (April 18, 2003)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-11 00:16:59
784Cryptography standards / Trusted computing / Cryptographic software / Trusted Platform Module / Windows XP / PKCS11 / Microsoft CryptoAPI / Security token / Smart card / Microsoft Windows / Cryptography / Computer security

smart security interface virtual smart card Logical Access Client for Trusted Platform Modules Windows, Linux, Mac

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2013-11-21 10:48:12
785Cryptography standards / Identifiers / X.509 / Internet protocols / Abstract Syntax Notation One / PKCS / Globally unique identifier / Elliptic Curve DSA / MD5 / Cryptography / Public-key cryptography / Cryptographic protocols

public_key Copyright © [removed]Ericsson AB, All Rights Reserved public_key 0.13 October[removed] Copyright © [removed]Ericsson AB, All Rights Reserved

Add to Reading List

Source URL: www.erlang.org

Language: English
786Security token / Ubiquitous computing / PKCS / Smart card / Unified Extensible Firmware Interface / Single sign-on / Windows XP / Public key infrastructure / Cryptography / Public-key cryptography / Cryptography standards

smart security interface all platforms one software for all

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2013-11-21 10:47:48
787Cryptographic protocols / Internet protocols / Internet standards / DigiNotar / Fox-IT / Certificate authority / Man-in-the-middle attack / Online Certificate Status Protocol / Revocation list / Cryptography / Public-key cryptography / Key management

Black Tulip Report of the investigation into the DigiNotar Certificate Authority breach Classification PUBLIC Customer Ministry of the Interior and Kingdom Relations

Add to Reading List

Source URL: www.rijksoverheid.nl

Language: English - Date: 2012-10-30 10:10:33
788Cryptography standards / Key management / Computer network security / XKMS / Public key infrastructure / XML / X.509 / Verisign / S/MIME / Cryptography / Public-key cryptography / Cryptographic protocols

White Paper _______________________ XML Trust Services

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2000-11-30 12:59:10
789PKCS / Smart card / Cryptographic Service Provider / Microsoft Outlook / Globally unique identifier / Cryptography / Public-key cryptography / Cryptography standards

POC: Jason R. Heiger, [removed] around 10 August[removed]Windows 7 64x AGM and Dual Persona’s Outlook 2007, and 32Bit Mail Client After much teeth gnashing, some articles on Militarycac.com, and some

Add to Reading List

Source URL: militarycac.com

Language: English - Date: 2011-09-15 01:19:23
790Man-in-the-middle attack / Secure communication / Internet standards / Cryptographic protocols / Cryptography / Convergence / Verisign

A Qualitative Comparison of SSL Validation Alternatives OWASP AppSec Research 2013 August 22nd, 2013 Henning Perl, Sascha Fahl, Michael Brenner, and Matthew Smith Leibniz Universität Hannover

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-29 17:20:56
UPDATE