Hardware security module

Results: 168



#Item
71One-time password / Cryptographic nonce / Hardware security module / Block cipher / Key / Authenticated encryption / EAX mode / Cryptography / Security / Block cipher modes of operation

YubiHSM User Manual Version: 1.0.4 May 21, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:06:44
72Validation / Key server / Hardware security module / Advanced Encryption Standard / Cryptography / Key management / One-time password

YubiCloud Validation Service Version[removed] yubico

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:06:12
73Security / Hardware-based full disk encryption / Pre-boot authentication / Two-factor authentication / Trusted Platform Module / Password / One-time password / Authentication / USB flash drive / Disk encryption / Cryptography / Computer security

YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:07:18
74Computing / USB flash drive / Data security / Universal Serial Bus / USB mass-storage device class / IronKey / Trusted Computing Group / Trusted Platform Module / BIOS / Computer hardware / USB / Computer security

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, and Weijin Wang Trusted Computing and Information Assurance Laboratory Institute of Sof

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-11 21:51:08
75Internet / Network architecture / Electronic commerce / Internet protocols / Cryptographic protocols / Transport Layer Security / Load balancing / Application firewall / Hardware security module / Computing / Internet standards / Secure communication

Keyless SSL Retain on-premise custody of SSL private keys with cloud-based DDoS mitigation, CDN, WAF and more Keyless SSL lets sites use CloudFlare for SSL traffic while retaining on-premise

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2014-09-17 20:09:21
76Computing / Cryptography / Disk encryption / Hardware-based full disk encryption / Trusted Computing Group / FIPS 140-2 / FIPS 140 / Parallel ATA / Trusted Computing / Computer hardware / Cryptography standards / Computer security

Microsoft Word - 9f - Seagate Secure® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 10:58:40
77Computing / Cryptographic software / Hardware security module / Smart cards / Ubiquitous computing / Java Card

Open Platform Development THE OPEN PLATFORM PROTECTION PROFILE (OP3) TAKING THE COMMON CRITERIA TO THE OUTER LIMITS

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
78FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / IPsec / Hardware random number generator / SHA-2 / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / FIPS 140-2

FIPS[removed]Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-24 09:18:16
79Cryptographic software / Intel vPro / Public key infrastructure / Hardware security module / Intel / Smart card / Pin / Cryptographic Service Provider / Microsoft CryptoAPI / Cryptography / Public-key cryptography / Key management

Intel® Identity Protection Technology with PKI (Intel® IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May[removed]

Add to Reading List

Source URL: ipt.intel.com

Language: English - Date: 2013-04-09 18:34:52
80Internet / Network architecture / Electronic commerce / Internet protocols / Cryptographic protocols / Transport Layer Security / Load balancing / Application firewall / Hardware security module / Computing / Internet standards / Secure communication

Keyless SSL Retain on-premise custody of SSL private keys with cloud-based DDoS mitigation, CDN, WAF and more Keyless SSL lets sites use CloudFlare for SSL traffic while retaining on-premise

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2014-09-17 20:09:21
UPDATE