Hardware security module

Results: 168



#Item
11Cryptography / Key management / Public-key cryptography / Key / Hardware security module / Session key / Derived unique key per transaction / Key generation

PDF Document

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:10
12Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Hardware security module / Name server / DS / Domain name system / Internet / Internet protocols

DNSSEC_Policy_nic.at_v1.0_2012

Add to Reading List

Source URL: www.nic.at

Language: English - Date: 2012-02-27 09:48:43
13Computing / OpenDNSSEC / Domain Name System Security Extensions / Hardware security module / NLnet / KASP / Creative Commons / Domain name system / Internet / Network architecture

OpenDNSSEC Slides based on material from the OpenDNSSEC project team © NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License. Tuesday, February 7, 12

Add to Reading List

Source URL: www.dns-school.org

Language: English - Date: 2014-11-25 09:41:03
14Machine-to-Machine / Computer network security / M2M / Security service / SMS / Hardware security module / Telit / SIMCom / Technology / Mobile technology / Communication

DOC Document

Add to Reading List

Source URL: ftp.onem2m.org

Language: English - Date: 2014-06-02 20:43:12
15Data security / Information Risk Management / Risk analysis / Espionage / Computing / SAS / Hardware security module / Classified information / Asset / Security / UICC / Computer security

FSG.04 Security Accreditation Scheme for UICC Production - Standard v0.1 (Current)

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2015-05-11 10:46:08
16Microsoft Windows / Trusted computing / Trusted Platform Module / Cryptographic software / Trusted Computing Group / Hardware-based full disk encryption / Data security / Encryption / FIPS 140-2 / Cryptography / Computer security / Disk encryption

Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-05-19 15:06:35
17Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
18Trusted computing / Espionage / Trusted Platform Module / Coprocessor / Tamper resistance / Kernel / Integrity / IBM / Secure cryptoprocessor / Computer security / Security / Cryptography

SECURITY Magic Boxes and Boots: Security in Hardware

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:35:31
19Public-key cryptography / Key management / Safenet / Hardware security module / Symmetric-key algorithm / Key generation / Vormetric / Pretty Good Privacy / Cryptography / Disk encryption / Cryptographic software

SafeNet KeySecure™ PRODUCT BRIEF Enterprise Key Management

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2013-06-27 09:42:19
20Computer buses / Computer hardware / Business / Computing / Electronic commerce / Payment card industry / Conventional PCI / EMV / Hardware security module / Payment systems / Data privacy / Credit cards

Microsoft Word - PTS_Program_Guide_2010_V1.0 finaldocx

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2010-10-28 16:18:57
UPDATE