FIPS 140

Results: 916



#Item
21Evaluating a watermelon: mitigating the threats through the operational environment 11th ICCC Turkey José Francisco Ruiz Gualda  1

Evaluating a watermelon: mitigating the threats through the operational environment 11th ICCC Turkey José Francisco Ruiz Gualda 1

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-09-02 02:49:00
22Microsoft Word - Choose_Testing_Lab.doc

Microsoft Word - Choose_Testing_Lab.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 06:51:53
23Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment  Who are we?

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:09:42
24Cryptographic Module Validation Program FIPSand FIPSModules In Process List Module Name Vendor Name

Cryptographic Module Validation Program FIPSand FIPSModules In Process List Module Name Vendor Name

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:11
25Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-08-02 22:30:34
26Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
27eIDAS Regulation  eSignature & eSeal Towards Real Implementation - an Overview of & Experiences with applying CEN/ETSI Standards & Best Practices

eIDAS Regulation eSignature & eSeal Towards Real Implementation - an Overview of & Experiences with applying CEN/ETSI Standards & Best Practices

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:11
28Symmetric-key algorithm / RSA / Security Target / Evaluation / Common Criteria / Advanced Encryption Standard / FIPS 140-2

centercenterSupporting Document Mandatory Technical Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 07:40:10
29Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015  About our Cryptographic and

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:48:48
30Confirmation pursuant to § 18 para. 5 SigG

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-02-05 10:51:00