Cryptography

Results: 21893



#Item
501Computer access control / Access control / Computer security / Cryptography / YubiKey / One-time password / Personalization

YubiKey for YubiCloud Configuration Guide

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-06-22 18:25:41
502Computing / Technology / Cryptography / Online banking / E-commerce / Technical communication / Electronic Banking Internet Communication Standard / Real-time gross settlement / FTAM / German Banking Industry Committee / Transport Layer Security / FinTS

EBICS Compendium Electronic Banking Internet Communication Standard Document version: 5

Add to Reading List

Source URL: www.ppi.de

Language: English - Date: 2016-07-08 11:05:07
503Computing / Security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security / Email / System administrator

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Patrons Adopted: May 24, 2002 ________________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-09-01 14:10:20
504Computer access control / Exonumia / Token coin / Computer security / Access token / Tamper-evident technology / Prevention / Safety / Cryptography / Security token / RSA SecurID

Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

Add to Reading List

Source URL: www.conlog.co.za

Language: English - Date: 2015-11-26 07:18:35
505Cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Application for employment

Bhutan Power Corporation Limited Thimphu : Bhutan BPC JOB APPLICATION FORM Post Applied For: Name: (In Block Letters)

Add to Reading List

Source URL: www.bpc.bt

Language: English - Date: 2013-06-24 04:36:54
506Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 09:29:08
507Cryptography / Education / Product certification / Standards / Key management / Public key infrastructure / Public-key cryptography / Professional certification / Public key certificate / Academic certificate / SGS

Certificate CH15The management System of Infomaniak Network SA Avenue de la Praille 26,

Add to Reading List

Source URL: www.infomaniak.fr

Language: English - Date: 2016-02-05 06:51:36
508Cryptography / Genealogy / Kinship and descent / Public key certificate

Chicago Genealogical Society Ancestor Certificate Application    

Add to Reading List

Source URL: chicagogenealogy.org

Language: English - Date: 2015-08-05 07:46:05
509Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
510Security / Politics / Cryptography / WikiLeaks / Espionage / Information sensitivity / National security / Whistleblowing / Julian Assange / Chelsea Manning

Omnibus Poll June, Opinion of Wikileaks Do you have a favorable or unfavorable opinion of Wikileaks? Gender

Add to Reading List

Source URL: cdn.yougov.com

Language: English - Date: 2013-06-12 15:48:01
UPDATE