Cryptography

Results: 21893



#Item
541Cryptography / Economy / IdenTrust / Society for Worldwide Interbank Financial Telecommunication / Authentication / Security

IdenTrust™ Trust Link Tr ust Link Accountability at Both the Individual and Company Level

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
542Cryptography / International Electrotechnical Commission / Standards organizations / Economy / BSI Group / Kitemark / Management system / BSI / Public key certificate / Film speed

Certificate of Registration QUALITY MANAGEMENT SYSTEM - ISO 9001:2008 This is to certify that: Diode Laser Concepts, IncCommerce Drive

Add to Reading List

Source URL: www.diodelaserconcepts.com

Language: English - Date: 2016-01-12 14:13:58
543Security / Computer network security / Cyberwarfare / Computer security / Cryptography / National security / Public-order crime / Threat / Political faction / Classified information in the United Kingdom

VICTORIAN PROTECTIVE DATA SECURITY FRAMEWORK (VPDSF) VPDSF BUSINESS IMPACT LEVEL (BIL) TABLE

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-08-09 01:19:38
544Security / Computer security / Prevention / Crime prevention / Cryptography / Information governance / National security / CompTIA / Information technology specialist / Information security / EMASS / Information assurance

IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-10-14 13:33:57
545Security / Computer security / Cyberwarfare / Computer network security / Crime prevention / Cryptography / National security / Government procurement in the United States / Critical infrastructure protection / NIST Cybersecurity Framework

DEFENSE CYBERSECURITY REQUIREMENTS: WHAT SMALL BUSINESSES NEED TO KNOW Office of Small Business Programs, U.S. Department of Defense 3600 Defense Pentagon, Room 3E185, Washington, DCWhy is cybersecurity impor

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
546Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:23:28
547Security / Computer security / Computing / Software testing / Computer network security / Cryptography / National security / Information security / Penetration test / Professional certification / Vulnerability / Security testing

Microsoft Word - choose_the_right_pentesting_company.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:21:33
548Microsoft / Computing / Prevention / Data security / Cryptography / FIPS 201 / Standards / Request for information / Information security / Outlook.com / PIV / Email

NPIVP Testing Request for Information NPIVP Testing Request for Information

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:40
549Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Computer security / Information security / Outline of computer security / Cyber security standards

Industrial & Research Challenges arising from User Requirements in Trustworthy ICT Building a European Security Environment among regions Prof. Norbert Pohlmann

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-06 08:01:09
550Cryptography / Random number generation / Randomness / Pseudorandom number generators / Information theory / Hardware random number generator / /dev/random / Entropy / Key / Pseudorandomness / Random seed / Statistical randomness

Network Working Group Request for Comments: 4086 BCP: 106 Obsoletes: 1750 Category: Best Current Practice

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:54
UPDATE