Digital signature

Results: 2653



#Item
121Literacy / Reading / Digital divide / Knowledge / Digital literacy / Boston University School of Education / Teacher leadership / STAR / Information literacy / Susan B. Neuman

ILA-signature-yellow_CMYK

Add to Reading List

Source URL: www.literacyworldwide.org

Language: English - Date: 2016-03-29 08:28:07
122Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
123Public-key cryptography / Key management / Simple public-key infrastructure / Authorization certificate / Public key infrastructure / X.509 / Public key certificate / MD5 / Digital signature / NP / RSA

Journal of Computer Security–322 IOS Press 285 Certificate chain discovery in SPKI/SDSI

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2016-07-18 22:33:05
124Elliptic curve cryptography / Automatic identification and data capture / Public-key cryptography / Ubiquitous computing / Radio-frequency identification / Elliptic curve / Cryptography / Elliptic Curve Digital Signature Algorithm

Institut für Integrierte Systeme Integrated Systems Laboratory ECC is Ready for RFID – A Proof in Silicon RFIDsec 08 Presentation

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:42:00
125Public-key cryptography / Cryptography / Financial cryptography / Key management / Blind signature / Electronic voting / Undeniable signature / Digital signature / Blinding / David Chaum / Ring signature / RSA

United States Patent] Chaum

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:19
126Analysis of algorithms / Cache / Oblivious ram / Digital signature

2015 IEEE Symposium on Security and Privacy Privacy and Access Control for Outsourced Personal Records Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schr¨oder Saarland University & CISPA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:16
1273D graphics software / Image processing / 3D printing / SketchUp / Digital imaging / Pixel aspect ratio / Largest photographs in the world

SIGNATURE PARTNER PRESENTING SPONSOR BP Design Competition SUBMISSION GUIDELINES

Add to Reading List

Source URL: skildclientimages.s3.amazonaws.com

Language: English - Date: 2015-12-02 17:19:50
128Electronic documents / Records management technology / Signature / Notary / Public-key cryptography / ELN / Land Registry / Digital signature

Proposed Electronic Conveyancing National Law

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:41:55
129Public-key cryptography / Payment systems / Key management / Financial cryptography / E-commerce / Lamport signature / Smart card / Digital signature / David Chaum / Cryptography / Signature / Debit card

llllllllllllllllillllllllllllllllllllllllllllllllllllllllllllllllllllllilli US005434919A United States Patent]

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:29
130Electronic documents / Cross-platform software / Gmail / Webmail / Internet privacy / Hashcash / Privacy / Information privacy / Bitcoin / Cryptographic hash function / Digital signature / Email

CPSCExam 2 // December 1, 2011 Answer all of the questions. Please remember to write your name, the course number, and today’s date on all blue books that you submit. This is a closed-book exam; please do n

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-12-12 14:53:47
UPDATE