Hardware security module

Results: 168



#Item
161Finance / Automated teller machine / Automation / Banks / Hardware security module / Magnetic stripe card / IBM / Personal identification number / Decimalization table attack / Technology / Payment systems / Business

Technical Report UCAM-CL-TR-560

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2003-02-18 14:11:21
162Key management / Public-key cryptography / Internet protocols / Internet standards / Domain Name System Security Extensions / ICANN / Hardware security module / Verisign / Root name server / Cryptography / Domain name system / Internet

DRAFT Root DNSSEC Design Team

Add to Reading List

Source URL: www.root-dnssec.org

Language: English - Date: 2010-06-07 17:50:52
163Computing / ICANN / Domain Name System Security Extensions / Verisign / Domain name / Hardware security module / Top-level domain / Domain name system / Internet / Cryptography

Provisional TCR Proposal[removed]

Add to Reading List

Source URL: www.root-dnssec.org

Language: English - Date: 2010-04-09 03:43:45
164Cryptographic protocols / Randomness / Key / Hardware security module / Public-key cryptography / Man-in-the-middle attack / Tamper resistance / Tamper-evident / Random number generation / Cryptography / Packaging / Security

Trusted Draw™ White Paper PROPRIETARY

Add to Reading List

Source URL: www.szrek.com

Language: English - Date: 2004-06-25 00:15:11
165Packaging / Security / Tamper resistance / Secure cryptoprocessor / Hardware security module / ISO standards / Ubiquitous computing / Power analysis / Smart card / Cryptography / Espionage / Technology

Technical Report UCAM-CL-TR-641

Add to Reading List

Source URL: crysys.hu

Language: English - Date: 2007-07-03 06:15:02
166Computer network security / Trusted Computing Group / Trusted Network Connect / IF-MAP / Trusted Platform Module / Interoperability / Hardware-based full disk encryption / Sun Microsystems / Cloud computing / Computer security / Trusted computing / Computing

PDF Document

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2011-01-24 12:08:23
167Tamper resistance / Hardware security module / Secure cryptoprocessor / Smart card / Power analysis / SecurID / Trusted Platform Module / Public-key cryptography / IBM / Cryptography / Espionage / Technology

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-04-08 09:15:29
168Dow Jones Industrial Average / IBM / Hardware security module / Business / Smart card / Key management / EMV / Linoma Software / Computing / Technology / Server hardware

PDF Document

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2013-09-05 03:42:59
UPDATE