FIPS 140

Results: 916



#Item
41Microsoft Word - SC037 _2015__v3

Microsoft Word - SC037 _2015__v3

Add to Reading List

Source URL: www.stc.tid.gov.hk

Language: English - Date: 2015-10-01 12:03:19
42Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

Add to Reading List

Source URL: bouncycastle.org

Language: English - Date: 2016-04-08 19:51:32
43ITL Bulletin, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (August 2015)

ITL Bulletin, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (August 2015)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-08-13 08:03:11
44Defensics_FAQ_LATEST_25Sept14.indd

Defensics_FAQ_LATEST_25Sept14.indd

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
45Microsoft Word - ISR4431_4451_FIPS_140_2_Security_Policy.docx

Microsoft Word - ISR4431_4451_FIPS_140_2_Security_Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-06-11 12:32:30
    46Microsoft Word - CWA14167-4_without_backup_CMCSO-PP_v028.doc

    Microsoft Word - CWA14167-4_without_backup_CMCSO-PP_v028.doc

    Add to Reading List

    Source URL: sogis.eu

    Language: English - Date: 2013-02-14 10:21:33
    47FIPS PUBCHANGE NOTICESFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supercedes FIPS PUB 140-1, 1994 January 11)

    FIPS PUBCHANGE NOTICESFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION (Supercedes FIPS PUB 140-1, 1994 January 11)

    Add to Reading List

    Source URL: www.nist.gov

    Language: English - Date: 2012-12-20 11:10:57
    48Trusted Hardware Radu Sion Stony Brook Trusted Hardware Laboratory   An important part of the tutorial will lie in conveying the insights of how practical limitations of

    Trusted Hardware Radu Sion Stony Brook Trusted Hardware Laboratory An important part of the tutorial will lie in conveying the insights of how practical limitations of

    Add to Reading List

    Source URL: www.sigsac.org

    Language: English - Date: 2008-10-06 10:03:17
    49Microsoft Word - CWA14167-2_with_backup_CMCSOB-PP_v028.doc

    Microsoft Word - CWA14167-2_with_backup_CMCSOB-PP_v028.doc

    Add to Reading List

    Source URL: sogis.eu

    Language: English - Date: 2013-02-14 10:21:34
    50Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1.  Opening Remarks 2.  The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV and PIV-I Us

    Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1.  Opening Remarks 2.  The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV and PIV-I Us

    Add to Reading List

    Source URL: www.fips201.com

    Language: English - Date: 2015-06-15 11:27:44