FIPS 140

Results: 916



#Item
11Technology / Security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Joint Light Tactical Vehicle / FIPS 140-2 / Global Positioning System / Telematics

Microsoft Word - 4RidgeFinalSEPres_08092103_0920.docx

Add to Reading List

Source URL: www.ndia-mich.org

Language: English - Date: 2013-08-19 10:06:02
12Computer security / Cryptography / Software / Cryptography standards / Resource Access Control Facility / FIPS 140-2 / FIPS 140 / Z/OS / Code signing / IBM System z

z/OS Version 2 Release 1 RACF Signature Verification Security Policy IBM® z/OS® Version 2 Release 1 Security Server RACF® Signature Verification Module version 1.0 FIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-19 10:01:42
13Computer security / Security / Prevention / Federal Information Security Management Act / Risk management framework / Government procurement in the United States / Information security / Security controls / Risk management / FIPS 140-2 / Information assurance / Security testing

U.S. Department of Commerce National Oceanic and Atmospheric Administration Office of the Chief Information Officer NOAA Security Assessment & Authorization [System Name – ID]

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-01-16 08:19:40
14Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-27 10:26:48
15Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:35
16Cryptography standards / Cryptography / Computing / FIPS 140-2 / Junos OS / FIPS 140 / Tamper-evident technology / Juniper Networks / Seal / Cryptographic Module Validation Program / Zeroisation / United States Navy SEALs

Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX240, SRX550, and SRX650 Services Gateways Non-Proprietary FIPSCryptographic Module Security Policy Version: 1.1 Date: July 26, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-26 14:51:24
17Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Information security / FIPS 140-2 / Consultant / Professional certification / Common Criteria

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:11:09
18Cryptography / Cryptography standards / Pseudorandom number generators / Key management / FIPS 140-2 / Random number generation / Dual EC DRBG / Key / Cryptographic primitive / Entropy / Cryptographic Module Validation Program / Block cipher

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2016-06-07 14:19:23
19Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Federal Information Security Management Act / Cryptographic Module Testing Laboratory / FIPS 140-3

Microsoft Word - Outline_Intro_FIPS140-2.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
20Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology / SHA-1 / Cryptographic Module Testing Laboratory

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 06:51:53
UPDATE