Cryptography

Results: 21893



#Item
901Cryptography / Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / Certificate authority / Certificate policy / Public key certificate / IdenTrust / Certification Practice Statement / X.509 / Authentication

IdenTrust Identity Certificate Policy [IP-ICP], Version 3.1a IDENTITY CERTIFICATE POLICY [IP-ICP] Operating Rules and System Documentation Release 3.1a

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
902Cryptography / Public-key cryptography / Financial cryptography / E-commerce / Blind signature / Electronic voting / David Chaum / Digital signature / Signature / RSA / Patent claim

Umted States PatentPatent Number: Chaum

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:24
903Cryptography / Cryptocurrencies / Bitcoin / Public-key cryptography / Alternative currencies / Digital currencies / CryptoNote / Zerocoin / Ring signature / Digital signature / Blockchain / Draft:Bitcoin address

CryptoNote v 2.0 Nicolas van Saberhagen October 17, 2013 1

Add to Reading List

Source URL: bytecoin.org

Language: English
904Computer network security / Security / Computing / Cyberwarfare / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Software-defined protection / Wireless security

Parapet_Service_Overview_20020522.doc

Add to Reading List

Source URL: www.ventajamarketing.com

Language: English - Date: 2008-12-09 00:36:52
905Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
906Security / Prevention / Computer security / Identification / Cryptography / Crime prevention / Information governance / National security / Common Criteria / Biometrics / Protection Profile / Fingerprint

Biometric Spoof Detection in the Context of Common Criteria Frank Grefrath, German Federal Office for Information Security Nils Tekampe, TÜV Informationstechnik GmbH 11. ICCC, September 2010, Turkey

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-08-25 09:46:40
907Computer access control / Cryptography / Computer security / Prevention / Password / Security / Login / Authentication / Password strength / Password notification email

Getting started with the ECDC Map Maker - EMMa This guide explains how you get access to EMMa as a new user. It consists of three sections:  Registering as a user – describes how to set yourself up as an EMMa user.

Add to Reading List

Source URL: emma.ecdc.europa.eu

Language: English - Date: 2015-05-18 03:47:48
908Biometrics / Identification / Fingerprint / Fingers / Human anatomy / Cryptography / Public key fingerprint / Security

Instructions for Completing Fingerprint Card

Add to Reading List

Source URL: www.myfloridalicense.com

Language: English - Date: 2007-08-07 15:38:31
909Security / Prevention / Computer security / Safety / Crime prevention / Cryptography / National security / Information security / Vulnerability / Security awareness / Attack / Security guard

Microsoft Word - Information Security Plan Verdoc

Add to Reading List

Source URL: security.sdsu.edu

Language: English - Date: 2013-03-13 15:56:21
910Cryptography / Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / StartCom / Certificate authority / Public key certificate / Professional certification / Revocation list / Certification Practice Statement

Kost Forer Gabbay & Kasierer 3 Aminadav St. Tel-Aviv, Israel Tel: +Fax: +

Add to Reading List

Source URL: www.startssl.com

Language: English - Date: 2016-03-31 00:00:53
UPDATE