Key Wrap

Results: 102



#Item
41Tex-Mex cuisine / Flatbreads / Chili con carne / Tortilla / Sandwich wrap / Food and drink / Mexican cuisine / Cuisine of the Southwestern United States

Crunchy Vegetable Wraps Nutrition Information Key Nutrients

Add to Reading List

Source URL: www.whatscooking.fns.usda.gov

Language: English - Date: 2014-08-15 09:39:08
42FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Critical Security Parameter / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 12:21:50
43Cryptographic software / FIPS 140-2 / Critical Security Parameter / Key Wrap / FIPS 140 / Key size / BitLocker Drive Encryption / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 1e - EFJohnson Technologies - Security Policy v5_28.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-10 14:59:55
44FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Initialization vector / Message authentication code / Data Encryption Standard / Project 25 / Key Wrap / Critical Security Parameter / Cryptography / Cryptography standards / Advanced Encryption Standard

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-16 11:58:21
45MIFARE / Cryptographic software / Key Wrap / Key size / Advanced Encryption Standard / NXP Semiconductors / FIPS 140-2 / FIPS 140 / Block cipher / Cryptography / Cryptography standards / Data Encryption Standard

Microsoft Word - 204d - JN2570-02_SecurityPolicy_v0.6.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-27 10:21:30
46FIPS 140-2 / Advanced Encryption Standard / Computer security / Key Wrap / Signcryption / Cryptography / Cryptographic software / Encryption

The most basic requirement is to encrypt FTI during transmission Information systems that receive, process, store, or transmit FTI, must: a. Protect the confidentiality and integrity of transmitted information. b. Imple

Add to Reading List

Source URL: www.taxadmin.org

Language: English - Date: 2014-10-16 15:56:57
47Hashing / Key management / Cryptographic software / HMAC / FIPS 140-2 / Key Wrap / FIPS 140 / Key size / CryptGenRandom / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 1a - Oristar SP.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 17:26:15
48Form / Ishikawa diagram / Root cause / Causality / Diagram / Problem / 5 Whys / Quality / Science / Management

Tip Sheet: Cause and Effect Analysis Tool 1. Introduction You have decided to improve the resource efficiency of your business and have established a team to look at the key waste issues. You have established the key are

Add to Reading List

Source URL: www.wrap.org.uk

Language: English - Date: 2013-11-15 07:11:38
49Punctuation / Dash / Control key / Word wrap / Cut /  copy /  and paste / Wrap / Microsoft Word / Double-click / Software / Typography / User interface techniques

How To: Post an Article Open Word using the Blog template. You can do this by double clicking Blog.vbs 200469511430000Enter Title in the “Enter Post Title Here” First line of article should be “By your name” Co

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2010-08-10 09:32:22
50National Security Agency / Key size / Symmetric-key algorithm / Triple DES / Project 25 / Wireless security / Secure voice / Strong cryptography / Key Wrap / Cryptography / Data Encryption Standard / Advanced Encryption Standard

DHS Office of Emergency Communications Guidelines for Encryption in Land Mobile Radio Systems September 2013

Add to Reading List

Source URL: www.azpsic.gov

Language: English - Date: 2013-10-02 16:37:55
UPDATE