Cryptography standards

Results: 2254



#Item
861Internet protocols / Security / Cyberwarfare / Internet standards / Extended Validation Certificate / Internet / CA/Browser Forum / Public key certificate / Certificate policy / Key management / Public-key cryptography / Electronic commerce

Microsoft Word - ILNAS_PKI_A004A.docx

Add to Reading List

Source URL: www.portail-qualite.public.lu

Language: English - Date: 2014-04-25 04:45:46
862Standards / Key management / Public-key cryptography / Conformity assessment / ISO/IEC 27001 / Accreditation / Public key certificate / Trust / Ethics / Law / Evaluation

Digital trust Process ILNAS/PSCQ/Pr001 Approuvé par : Alain Wahl Version 4.2 – [removed]

Add to Reading List

Source URL: www.portail-qualite.public.lu

Language: English - Date: 2015-01-16 04:28:07
863Standards / Accreditation / Public key infrastructure / Public key certificate / Professional certification / Ethics / Thought / Business / National Accreditation Board for Testing and Calibration Laboratories / Key management / Public-key cryptography / Quality assurance

Microsoft Word - ILNAS_PKI_P004.doc

Add to Reading List

Source URL: www.portail-qualite.public.lu

Language: English - Date: 2014-04-25 04:46:32
864European Telecommunications Standards Institute / Certificate policy / Extended Validation Certificate / Certificate authority / Key management / Public-key cryptography / Public key certificate

PKI Form n° 001A Application to grant, extend or renew an accreditation for a Certification Service Provider Modifications: address change

Add to Reading List

Source URL: www.portail-qualite.public.lu

Language: English - Date: 2014-04-25 04:45:50
865Crime prevention / Certificate policy / Key management / FIPS 140-2 / Public safety / Information security / Trusted timestamping / Computer security / Security / Cryptography standards

Microsoft Word - ILNAS_PKI_A007.docx

Add to Reading List

Source URL: www.portail-qualite.public.lu

Language: English - Date: 2014-04-25 04:45:48
866Public-key cryptography / PAdES / XAdES / CAdES / Trusted timestamping / Digital signature / Public key infrastructure / Electronic signature / Public key certificate / Cryptography / Cryptography standards / Key management

Assortiment de produits LuxTrust

Add to Reading List

Source URL: www.luxembourg-internet-days.com

Language: English - Date: 2014-11-25 12:03:41
867Validity / Computer security / Cryptographic Module Validation Program / National Information Assurance Partnership / Common Criteria Testing Laboratory / Thought / Common Criteria Evaluation and Validation Scheme / Common Criteria / Validation / Evaluation / Cryptography standards / Pharmaceutical industry

Frequently Asked Questions for NIAP Policy #5: 1. Why is this policy being issued? This policy is being issued to help streamline the NIAP evaluation/validation process, help reduce cost, and eliminate redundant activiti

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-11-04 13:47:52
868Key management / X.509 / Cryptography standards / Portable Executable / Electronic commerce / PKCS / Code signing / Public key certificate / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

Windows Authenticode Portable Executable Signature Format Version 1.0 — March 21, 2008  Abstract Authenticode® is a digital signature format that is used to determine the origin and integrity of software binaries. A

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-07-29 12:01:34
869FIPS 140-2 / Cryptography / Public key certificate / Cryptography standards

CRYPTOGRAPHIC ACCESS CERTIFICATION AND TERMINATION PRIVACY ACT STATEMENT AUTHORITY: EO 9397, EO 12333, and EO[removed]PRINCIPAL PURPOSE(S): To identify the individual when necessary to certify access to classified cryptog

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2014-11-25 11:39:29
870Computer security / Identity management / FIPS 140 / Controller / Cryptography standards / Security / Access control

Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-06 09:12:24
UPDATE