Hardware security module

Results: 168



#Item
151Cryptographic Module Validation Program / Hardware security module / Bomgar / Enterprise Vault / FIPS 140-3 / FIPS 140 / Cryptography standards / FIPS 140-2 / Computing

http://csrc.nist.gov/groups/STM/cmvp/documents[removed]140val-all.htm Certificate Number Validation / Posting Date

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-24 22:00:58
152Business / Finance / Electronic commerce / Automated teller machine / Automation / Banks / Debit card / Suchak Data Systems / Hardware security module / Payment systems / Technology / Embedded systems

ATM / POS Processing System - Suchak Data Systems

Add to Reading List

Source URL: www.sdsbanksys.com

Language: English - Date: 2008-07-23 09:58:53
153Network architecture / Computing / Key management / Internet standards / DNSSEC / Domain Name System Security Extensions / Extensible Provisioning Protocol / Audit / Hardware security module / Domain name system / Internet / Internet protocols

DNSSEC Infrastructure Audit Framework NLnet Labs Document[removed]Version 1.0 by Matthijs Mekking ([removed]) and Olaf Kolkman ([removed]) This framework is documented under NLnet Labs copyright and

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-12-30 04:22:36
154Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
155X.509 / PKCS / Hardware security module / Public key infrastructure / Certificate authority / Public key certificate / Windows / Triple DES / Network Security Services / Cryptography / Public-key cryptography / Key management

SecretAgent is unsurpassed at ensuring the confidentiality, integrity, and authenticity of sensitive data at-rest and in-transit. Security-conscious government agencies and corporations worldwide rely on SecretAgent to a

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2009-11-06 16:41:01
156Electronic commerce / Public-key cryptography / Cryptography standards / Hardware security module / Cryptographic primitive / ProVerif / Formal verification / Secure channel / Microsoft CryptoAPI / Cryptography / Cryptographic protocols / Cryptographic software

Prosecco Programming Securely with Cryptography A Project-Team Proposal Karthikeyan Bhargavan

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2012-03-14 05:31:34
157Cydia / Universal Serial Bus / Computer security / Smartphones / Computer hardware / Software / Subscriber identity module

Gmate User User’’s manual English version[removed]IOS Platform 1

Add to Reading List

Source URL: www.speeka.com

Language: English - Date: 2012-06-14 21:55:19
158Public key certificate / X.509 / Code signing / Self-signed certificate / Certificate server / Revocation list / Certificate authority / Root certificate / Hardware security module / Cryptography / Public-key cryptography / Key management

Securing Your Private Keys as Best Practice for Code Signing Certificates

Add to Reading List

Source URL: www.thawte.de

Language: English - Date: 2012-05-10 17:51:38
159Money / EMV / Chip and PIN / Bitcoin / Debit card / Smart card / Automated teller machine / Hardware security module / Payment card / Payment systems / Business / Technology

1 Security Protocols and Evidence: Where Many Payment Systems Fail Steven J. Murdoch, Ross Anderson University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-02-03 06:54:07
160Disk encryption / Data security / PKCS / Hardware security module / X.509 / Backup / Windows / Encryption software / Information security / Cryptography / Cryptographic software / Public-key cryptography

SpyProof! protects sensitive data-at-rest from internal and external threats. Its intelligent use of virtual disk encryption technology protects important data with little impact on performance. SpyProof! is effective, i

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2009-11-06 17:24:24
UPDATE