Key authentication

Results: 993



#Item
401Electronic commerce / Secure communication / Digital rights management / Authentication / Computer security / Cryptography / Security / Public-key cryptography

列印 Print 重設 Reset Director-General of Trade and Industry (Attn.: Classification Section, Strategic Trade Controls Branch)

Add to Reading List

Source URL: www.stc.tid.gov.hk.

Language: English - Date: 2013-10-17 12:00:06
402Public key infrastructure / Public key certificate / Certificate authority / Phishing / Digital signature / Password / Authentication / Certificate policy / Certificate server / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - Application of PKI in IT Security v4.1.ppt [相容模式]

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2012-10-26 00:42:00
403Ubiquitous computing / Access control / Smart cards / Security token / Biometrics / Identity document / Authentication / Public key infrastructure / Contactless smart card / Security / Cryptography / ISO standards

LC Paper No. CB[removed]) Response to the Legislative Council Brief on the New Hong Kong Identity Card Dit-Yan Yeung (楊瓞仁) Associate Professor Department of Computer Science School of Engineering

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2005-08-10 22:42:42
404Public key infrastructure / Public key certificate / Certificate authority / Phishing / Digital signature / Password / Authentication / Certificate policy / Certificate server / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - Application of PKI in IT Security v4.1.ppt [相容模式]

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2012-10-26 00:41:59
405Authentication / Hardware-based full disk encryption / Disk encryption hardware / Cryptography / Disk encryption / Key

Common Criteria Recognition Arrangement Development Board CCDB SWFDE cPP WG Title: Full Disk Encryption Essential Security Requirements

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-05-22 09:15:17
406Finite fields / Galois/Counter Mode / Key management / NSA Suite B Cryptography / Block cipher / Authenticated encryption / Cryptographic hash function / Advanced Encryption Standard / Initialization vector / Cryptography / Message authentication codes / Block cipher modes of operation

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
407Cryptographic hash function / RSA / SHA-1 / Digital signature / Message authentication code / Cryptography / Public-key cryptography / MD5

CS255: Cryptography and Computer Security Winter 2005 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-03-13 22:33:48
408Malware / Cryptography / Backdoor / Rootkits / Spyware / Password / One-time password / SecurID / Security / Cyberwarfare / Computer security

A Framework to Eliminate Backdoors from Response-Computable Authentication Shuaifu Dai1 , Tao Wei1,2∗ , Chao Zhang1 , Tielei Wang3 , Yu Ding1 , Zhenkai Liang4 , Wei Zou1 1 Beijing Key Lab of Internet Security Technolo

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2012-08-15 18:04:31
409Phelix / Block cipher / RC4 / Ciphertext / Symmetric-key algorithm / Cipher / Advanced Encryption Standard / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
410Notary / Electronic commerce / Digital signature / Public key certificate / Electronic Signatures in Global and National Commerce Act / Authentication / Electronic signature / Uniform Electronic Transactions Act / Cryptography / Public-key cryptography / Key management

CONSOLIDATED TO 1 DECEMBER 2014 LAWS OF SEYCHELLES ELECTRONIC TRANSACTIONS ACT [20th December, 2001] Act 8 of 2001 S.I. 38 of 2001

Add to Reading List

Source URL: zoupio.lexum.com

Language: English
UPDATE