FIPS 201

Results: 304



#Item
1Personal Identity Verification (PIV) Request for DOC Credential

Personal Identity Verification (PIV) Request for DOC Credential

Add to Reading List

Source URL: osec.doc.gov

Language: English - Date: 2009-01-05 08:53:51
2Microsoft / Computing / Prevention / Data security / Cryptography / FIPS 201 / Standards / Request for information / Information security / Outlook.com / PIV / Email

NPIVP Testing Request for Information NPIVP Testing Request for Information

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:40
3Identity Management Focuses on Credentialing HSPD-12 Will Serve as a Unifier for Agencies Security Inc. of Redwood City, Calif., 59 percent of system integrators (SIs) surveyed see the lack of

Identity Management Focuses on Credentialing HSPD-12 Will Serve as a Unifier for Agencies Security Inc. of Redwood City, Calif., 59 percent of system integrators (SIs) surveyed see the lack of

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
4Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015  About our Cryptographic and

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-07-08 14:07:07
5PIV Login Quick Reference Guide   PIV Users can only login with Internet Explorer  What is PIV and who uses it?

PIV Login Quick Reference Guide   PIV Users can only login with Internet Explorer What is PIV and who uses it?

Add to Reading List

Source URL: floodmaps.fema.gov

Language: English - Date: 2016-03-23 12:12:55
6Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015  About our Cryptographic and

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:35
7Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015  About our Cryptographic and

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 06:51:53
8Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015  About our Cryptographic and

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:48:48
9Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger IBM Research Division, Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NY 10598, USA

Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger IBM Research Division, Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NY 10598, USA

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-26 07:57:52
10Best Practices for Privileged User PIV Authentication

Best Practices for Privileged User PIV Authentication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-21 07:36:03