Digital signature

Results: 2653



#Item
451Public-key cryptography / Computer law / Electronic signature / Email / Digital signature / Public key certificate / Telecommunications data retention / EGovernment in Europe / Cryptography / Electronic documents / Key management

Electronic Communications Transactions Act No.25 of12:02 PM Act No. 25, 2002 ELECTRONIC COMMUNICATIONS AND TRANSACTIONS ACT. 2002

Add to Reading List

Source URL: www.honda.co.za

Language: English - Date: 2012-01-17 06:26:34
452X.509 / Public key infrastructure / PKCS / Credential / Cryptographic nonce / Cryptography / Public-key cryptography / Digital signature

Alpaca: Extensible Authorization for Distributed Services Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Morris, and M. Frans Kaashoek MIT CSAIL Cambridge, MA, USA {ctl,

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-11-10 14:15:06
453Finite fields / Computational hardness assumptions / Diffie–Hellman key exchange / Key-agreement protocol / Diffie–Hellman problem / ID-based encryption / XTR / Key exchange / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

ID-based Authenticated Two Round Multi-Party Key Agreement

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-20 20:23:11
454Public-key cryptography / BlackBerry / Java platform / Key management / Code signing / Application programming interface / Java Servlet / Digital signature / Java / Cryptography / Computing / Software

BlackBerry Signing Authority Tool VersionPassword Based Administrator Guide BlackBerry Signing Authority Tool VersionPassword Based Administrator Guide

Add to Reading List

Source URL: docs.blackberry.com

Language: English - Date: 2014-05-09 21:57:35
455Easement / Legal professions / Notary / Covenant / Land lot / Plan / Solicitor / Leasing / Digital signature / Law / Civil law / Real property law

DEPOSITED PLAN CHECKLIST for LODGING AGENTS and SOLICITORS This checklist must accompany the original plan when lodged in LPI for registration Note: This checklist is designed to compliment items in letters of requisitio

Add to Reading List

Source URL: rgdirections.lpi.nsw.gov.au

Language: English - Date: 2010-01-25 00:51:00
456Notary / Access control / Authentication / Packaging / Signature / Digital signature / Online banking / Password / Cryptography / Security / Civil law

Manager, --------------------------------------------------------------------------------------------------------------------------------Dear Sir / Madam, APPLICATION FOR RE ISSUE A PASSWORD Please be good enough to re i

Add to Reading List

Source URL: documents.gov.lk

Language: English - Date: 2014-07-15 00:45:08
457Media technology / Sound recording and reproduction / Civil law / Digital signature / Ringtone / Electronic engineering / Cryptography / Telephony / Audio engineering

KAMP DIGITAL RIGHTS AGREEMENT Digital Transactions involving Sound Recordings It is hereby agreed that KAMP shall administer on behalf of the Member and / or Music Producer owning rights in Sound Recordings in accordanc

Add to Reading List

Source URL: www.kamp.or.ke

Language: English - Date: 2015-03-26 08:06:30
458Certificate policy / Public key certificate / Revocation list / Online Certificate Status Protocol / Certificate authority / Public key infrastructure / Digital signature / X.509 / Data Validation and Certification Server / Cryptography / Public-key cryptography / Key management

Signature RTD Certificate Policy Policy Document VersionSIGNATURE_CP] NFC ForumTM

Add to Reading List

Source URL: members.nfc-forum.org

Language: English
459Spreadsheet / Digital signature / Cyberwarfare / Telecommuting / Working time / Civil law

Federal Reporting Requirements State Plan Financial Expenditures Data Progress Report Form Number H224 SGAT – RSA-664 H224 SGAT SF-269 (old)

Add to Reading List

Source URL: resnaprojects.org

Language: English - Date: 2012-01-13 12:02:13
460Digital signature / RSA / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / ID-based encryption

Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-30 05:02:16
UPDATE