Key System

Results: 6849



#Item
611Computing / Internet protocols / Internet standards / Key management / DNSSEC / Domain Name System Security Extensions / TSIG / DNS spoofing / Name server / Domain name system / Internet / Network architecture

DNSSEC HOWTO, a tutorial in disguise Olaf Kolkman Revision 136 April 7, 2010 Download the most recent PDF release from:

Add to Reading List

Source URL: www.dns-school.org

Language: English - Date: 2014-11-25 09:40:06
612Trade facilitation / Export / Consignment / Consignee / Trade facilitation and development / International trade / Business / Single-window system

Single Window Implementation: Benefits and Key Success Factors UNNExT Capacity Building Workshop for Tajikistan Single Window ImplementationNovember 2012

Add to Reading List

Source URL: unnext.unescap.org

Language: English - Date: 2014-01-16 02:37:29
613Public key certificate / Public-key cryptography / Pulp and paper industry / Ecolabelling / Forest Stewardship Council / Fsc chain of custody / Forestry / Electronic commerce / Key management

NEPCon hereby confirms that the chain of custody system of Copenhagen Hardwood ApS Holmevej 103 Veksø, Denmark

Add to Reading List

Source URL: www.copenhagenhardwood.dk

Language: English - Date: 2015-02-12 08:52:03
614Key management / Public key certificate / Radiographic testing / Reliability engineering / Systems engineering / Science / Systems science / Public-key cryptography / Imaging / Electronic commerce

Certificate of Registration This certifies that the Quality Management System of Nray Services Inc. 56A Head Street Dundas, Ontario, L9H 3H7, Canada

Add to Reading List

Source URL: nray.ca

Language: English - Date: 2014-07-25 12:30:14
615Late-2000s financial crisis / United States federal banking legislation / Financial risk / Systemic risk / Dodd–Frank Wall Street Reform and Consumer Protection Act / Federal Reserve System / Investment banking / American International Group / Financial crisis / Economics / Economic history / Economic bubbles

FOR IMMEDIATE RELEASE CONTACT: Marcus Stanley, AFR STATEMENT ON SENATOR SHELBY’S DRAFT BILL Senator Shelby’s 216-page draft legislation makes sweeping changes that would significantly weaken key financia

Add to Reading List

Source URL: ourfinancialsecurity.org

Language: English - Date: 2015-05-12 15:45:57
616XTR / Secure multi-party computation / Alice and Bob / Diffie–Hellman key exchange / Public-key cryptography / PP / X Window System / Commitment scheme / Cryptography / Cryptographic protocols / Oblivious transfer

One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2000-04-12 11:39:28
617Network architecture / Internet protocols / Extensible Provisioning Protocol / Domain Name System Security Extensions / XML / Domain name / Internet Standard / Computing / Domain name system / Internet

draft-gieben-epp-keyrelay-02 - Key Relay Mapping for the Extensible Provisioning Protocol

Add to Reading List

Source URL: www.sidnlabs.nl

Language: English - Date: 2013-04-15 01:41:47
618GlobalSign / Code signing / Cross-platform software / Adobe AIR / Public key certificate / Windows Vista / Operating system / Root certificate / Cryptography / Key management / Public-key cryptography

GlobalSign ObjectSign™ Secure distributable code and applications Software vendors can digitally sign and timestamp the software they distribute over the Internet. This digital signing process is the virtual equivalent

Add to Reading List

Source URL: www.fairssl.dk

Language: English - Date: 2009-11-11 03:57:00
619Ecolabelling / Electronic commerce / Key management / Public key certificate / Public-key cryptography / Forest Stewardship Council / Fsc chain of custody / Forestry / Environment / Pulp and paper industry

NEPCon hereby confirms that the chain of custody system of Fridolf A/S Zahrtmannsvej 67 Rønne, Denmark

Add to Reading List

Source URL: skibby-hovedgaden.xl-byg.dk

Language: English - Date: 2015-02-26 07:32:16
620Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
UPDATE