Cryptography

Results: 21893



#Item
841Cryptography / Public-key cryptography / Key management / Konrad Zuse / Mechanical computers / Elliptic curve cryptography / Radio-frequency identification / Key / Z2 / Z1 / Digital signature

Proceedings - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:43:24
842Cryptography / Public key infrastructure / Key management / Public-key cryptography / E-commerce / Public key certificate / New York State Education Department / Academic certificate / Librarian

It is critically important that all certificate holders issued a Public Librarian Certificate as of January 1, 2010 and thereafter update their personal contact information using the new online portal as soon as possible

Add to Reading List

Source URL: palmerblog.liu.edu

Language: English - Date: 2015-02-02 16:01:28
843Computer access control / Cryptography / Humancomputer interaction / Technical communication / Usability / Authentication / Computer security / Security

SOUPSPersonal Choice and Challenge Questions: A Security and Usability Assessment 16 July 2009

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-16 14:02:05
844Cryptography / Security / Computer security / Computer access control / Public-key cryptography / Electronic documents / Notary / SAFE-BioPharma Association / Identity management / Digital signature / SAFE / Authentication

VASCO MYDIGIPASS Gains SAFE-BIOPHARMA Full-Service Credential Service Provider Certification OAKBROOK TERRACE, IL and TENAFLY, NJ – August 10, VASCO Data Security International, Inc. (NASDAQ: VDSI), a global le

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-08-10 11:17:32
845Computer security / Computing / Data security / Cryptography / Crime prevention / Tests / Common Criteria / Protection Profile / Security Target / Evaluation / Information security / Evaluation Assurance Level

Microsoft Word - CCBusinessUsersSeminarOutline.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:45
846Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Kek

KEK GRID CA Service Certificate Policy and Certificate Practices Statements Ver

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2013-12-17 04:24:25
847Cryptography / Signature / Cryptography standards / Computer law / Public-key cryptography / E-commerce / ETSI / Trust service provider / Public key certificate / Electronic signature / X.509 / Common technical regulation

ENV2Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 5: QCStatements

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-06-17 07:25:26
848Mathematics / Abstract algebra / Algebra / Elliptic curves / Group theory / Finite fields / Elliptic curve cryptography / Analytic number theory / Elliptic curve / Supersingular elliptic curve / Prime number / Algorithm

CM proofs for elliptic curves over number elds Stephen Enright•Ward Für meine Lieblingsdeutschlehrerin.

Add to Reading List

Source URL: iml.univ-mrs.fr

Language: English - Date: 2014-09-16 07:05:16
849Computing / Internet / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / NLnet / Name server / OpenDNSSEC

dnSSexy a verifying DNS (SEc) proXY Willem Toorop NLnet

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2012-04-17 19:03:57
850Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
UPDATE