Back to Results
First PageMeta Content
Data / Cryptographic protocols / Tunneling protocols / HMAC / Hashing / Advanced Encryption Standard / IPsec / Cryptography standards / Cryptography / Computing / Internet protocols


Microsoft Word[removed]001_d.doc
Add to Reading List

Document Date: 2009-12-31 00:00:00


Open Document

File Size: 189,16 KB

Share Result on Facebook

City

Drive Raleigh / /

Company

Product Features Hardware / Hertz / Red Hat / CBC / SafeNet / Microsoft / The AES / Adobe / /

Country

United States / /

Currency

Rs / /

Event

FDA Phase / /

Facility

Ethernet Management Port / Craft Port / Local Ethernet Port / Remote Ethernet Port / Center Drive Raleigh / Local Gigabit Ethernet Port / Serial Port / Remote Gigabit Ethernet Port / Ethernet Port / /

IndustryTerm

web-based management / encryption processing / product developer / security processing / Internet Explorer version / wireless networks / user-supplied software / trusted and untrusted networks / requested services / security services / cryptographic services / data authentication / secure device management / Internet Key Exchange / security protocols / encryption services / /

OperatingSystem

Red Hat Linux / XP / Linux / Microsoft Windows / Microsoft Windows 2000 / /

Organization

Federal Government / Security Association / /

Person

Key Authenticate / Pam Morris Checked / /

/

Position

Crypto-Officer / crypto officer / Certificate Manager / Manager application and user-supplied software / Crypto Security Officer / policy editor / Author / /

Product

Windows XP / Windows 2000 / Linux / Explorer version 6.0 / Explorer 6.0 / MD5 / /

ProgrammingLanguage

XML / DC / /

ProvinceOrState

North Carolina / /

PublishedMedium

the CipherOptics ESG User Guide / the User Guide / /

Technology

XML / using FIPSapproved algorithms / subnet mask / Linux / VPN / using FIPS-approved algorithms / security protocols / secret key / operating systems / HMAC SHA-1 algorithm / Triple-DES encryption / pdf / line rate Ethernet Frame encryption / encryption / Ethernet / using FIPS Approved algorithms / 2 Ethernet Frame Encryption / FIPS-Approved encryption / SDRAM / Ethernet encryption / terminal emulation / processing traffic using FIPS Approved algorithms / Ethernet frame encryption / Flash / Acrobat / GUI / Gigabit Ethernet / /

URL

www.microsoft.com / www.adobe.com / www.netscape.com / /

SocialTag