Cryptography

Results: 21893



#Item
921Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Public key certificate / X.509 / Certification Practice Statement / Authentication

DOE Grids CA Certificate Policy and Certification Practice Statement

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2008-09-03 15:39:00
922Signature / Cryptography standards / Cryptography / Computer law / Regulation / EIDAS / Smart card / Eid / Mobile signature

Austrian eID and its road to eIDAS Herbert Leitold, A-SIT From national eID to eIDAS When Austria introduced its Citizen Card through the

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-06-14 08:40:58
923Block chain / Workshop on Cryptographic Hardware and Embedded Systems / Cryptocurrency / Crypto / Economy

9th International View of the State-of-the-Art of Cryptography and Security and its Use in Practice Friday, May 13, 2016 9am-5pm Address: Österreichische Computer Gesellschaft (OCG), Wollzeile 1, 1010 Wien Registration:

Add to Reading List

Source URL: ist.ac.at

Language: English - Date: 2016-05-07 05:07:22
924Cryptography / International Electrotechnical Commission / Standards organizations / BSI Group / Kitemark / Management system / Public key certificate / Film speed

Certificate of Registration ENVIRONMENTAL MANAGEMENT SYSTEM - ISO 14001:2004 This is to certify that: FMC Chemicals Limited Wirral International Business Park

Add to Reading List

Source URL: www.fmclithium.com

Language: English - Date: 2013-12-05 11:53:51
925Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Security guard / Cheyenne / Computer security / Occupational safety and health / Background check

NORTHERN CHEYENNE TRIBE TRIBAL BOARD OF HEALTH JOB ADVERTISEMENT 2016 POSITION: Security Guard (1) Full-Time

Add to Reading List

Source URL: www.nctribalhealth.org

Language: English - Date: 2016-07-12 13:20:43
926Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Computer access control / Cryptography / Molva / Authentication / Identification / Humancomputer interaction / Security

The Molva - Di Pietro scheme Problems with the identification Design flaws

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-10 03:06:40
927Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Data transmission / Handshaking / Network architecture / Authenticated encryption / Transport Layer Security

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Christian Badertscher1, Christian Matt1, Ueli Maurer1, Phil Rogaway2, Björn Tackmann3 1ETH

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
928Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / High availability / Information security / Identity document / Business continuity planning

MOR Version 3 Consultation Feedback Issues Table

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:42:34
929Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Cyberwarfare / Computer security / Information security / Computer network / Vulnerability

Policy on Responsible and Ethical Use of Computing Resources Final version, approved by the CIT October 26, 1998 Revisions approved by the CIT November 4, 2002 Revisions approved by IT Executive Committee (ITEC) January

Add to Reading List

Source URL: infosec.wfu.edu

Language: English - Date: 2016-02-05 15:10:03
930Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Software project management / Computer security / Abuse case / Vulnerability / Andreas Lothe Opdahl

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: , Volume 3, Issue 2, March – April 2014 ISSNMea

Add to Reading List

Source URL: www.ijettcs.org

Language: English - Date: 2014-05-13 04:33:09
UPDATE