Digital signature

Results: 2653



#Item
381Computer law / Electronic signature / Public key certificate / Digital signature / Uniform Electronic Transactions Act / Digital Postmarks / Cryptography / Key management / Public-key cryptography

ISSN035X THE UNITED REPUBLIC OF TANZANIA BILL SUPPLEMENT 20th February, 2015

Add to Reading List

Source URL: www.parliament.go.tz

Language: English - Date: 2015-04-27 06:43:34
382Microarrays / DNA microarray / Gene regulatory network / Bioinformatics / Ridge / Digital signature / Affymetrix / Gene expression profiling / Biology / Gene expression / Science

Determination of minimal transcriptional signatures of compounds for target prediction

Add to Reading List

Source URL: bsb.eurasipjournals.com

Language: English
383Email / Electronic documents / Man-in-the-middle attack / Trusted third party / Alice and Bob / Simple Mail Transfer Protocol / Digital signature / Needham–Schroeder protocol / Cryptography / Public-key cryptography / Cryptographic protocols

TRICERT: A Distributed Certified E-Mail Scheme Giuseppe Ateniese Breno de Medeiros Michael T. Goodrich

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:08:05
384Public key infrastructure / X.509 / Revocation list / Public key certificate / Certificate authority / Digital signature / Online Certificate Status Protocol / Smart grid / Certificate policy / Cryptography / Public-key cryptography / Key management

1 Cryptographic Scalability Challenges in the Smart Grid (Extended Abstract) Sean W. Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2012-04-18 14:18:48
385Routing protocols / Public-key cryptography / Computer networking / Border Gateway Protocol / Routing / Router / Path vector protocol / Digital signature / Convergence / Cryptography / Network architecture / Computing

ZHAO LAYOUT:06 PM

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-01-31 09:28:00
386Email / Technology / Digital media

Please complete the following section for funding through the SCFPA’s Smart Summers, Strong Kids program. Applications should be completely filled out, including the signature of a DSS representative, when submitted. R

Add to Reading List

Source URL: scfpa.com

Language: English - Date: 2015-02-11 21:15:13
387Cyberwarfare / Mathematics / Schnorr signature / NP / Digital signature / RSA / Public-key cryptography / Cryptography / Applied mathematics

Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-06-07 15:20:20
388Notary public / ENotary / Certified copy / Email / Act / Digital signature / Document / Civil law / Notary / Law

PDF Document

Add to Reading List

Source URL: www.sos.arkansas.gov

Language: English - Date: 2015-05-14 12:15:08
389Digital signature / Digital Signature Algorithm / SHA-2 / SHA-1 / RSA / FIPS 140-2 / Public key certificate / Cryptography / Public-key cryptography / Elliptic Curve DSA

PDF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:18:14
390Public key certificate / Certificate authority / Electronic signature / Digital signature / Electronic Signatures in Global and National Commerce Act / X.509 / Uniform Electronic Transactions Act / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: rechtsinformatik.jura.uni-sb.de

Language: English - Date: 2007-09-11 09:44:04
UPDATE