Key authentication

Results: 993



#Item
631Key management / Access control / Authentication / United States Government Printing Office / Federal Depository Library Program / Cryptographic hash function / Federal Digital System / Digital signature / Cryptography / Notary / Public-key cryptography

Overview of GPO’s Authentication Program For more than 150 years, the core mission of the U.S. Government Printing Office (GPO), Keeping American Informed, has remained unchanged. Since 1861 users have looked to GPO as

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-06-15 07:11:55
632Identity / Electronic commerce / Public key infrastructure / X.509 / Identity management / Digital identity / Public key certificate / Authentication / WISeKey / Cryptography / Public-key cryptography / Key management

Non-Intrusive Identity Management Dr. Stefan Brands McGill School of Computer Science & Credentica April 12, 2004 Presented to: 3rd Annual PKI R&D Workshop, Gaithersburg

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-04-19 19:10:59
633Authentication / Notary / Packaging / United States Government Printing Office / Public Printer of the United States / Public key infrastructure / Cryptography / Key management / Access control

National Bibliography of U

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
634X.509 / Public key certificate / Certificate authority / Internet privacy / Revocation list / Privacy / Personally identifiable information / Key authentication / Public key infrastructure / Cryptography / Public-key cryptography / Key management

2nd Annual PKI Research Workshop Pre-Proceedings http://middleware.internet2.edu/pki03/ Gaithersburg, Maryland, USA April 28-29, 2003

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-28 10:41:51
635Authentication / FIPS 201 / Electronic authentication / Smart card / Security token / Public key infrastructure / Cryptography / Security / Two-factor authentication

FIPS[removed]Workshop NIST PIV Team National Institute of Standards and Technology US Department of Commerce Gaithersburg, MD April 18 – 19, 2011

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-04-20 01:00:00
636Electronic authentication / Standards organizations / Message authentication codes / Authentication / National Institute of Standards and Technology / Identity assurance / One-key MAC / Cryptography / Security / Identity management

This DRAFT (NIST Draft SP[removed]document has been approved as FINAL, and has been superseded by the following publication: Publication Number: Special Publication[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-05 12:30:43
637Cryptographic hash functions / Error detection and correction / Hash tree / Digital signature / Cryptographic primitive / Merkle signature scheme / Lamport signature / Cryptography / Hashing / Public-key cryptography

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23
638Identity / Key management / Federated identity / Public-key cryptography / Security Assertion Markup Language / Liberty Alliance / Public key certificate / Authentication / Identity provider / Cryptography / Computer security / Identity management

PDF Document

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-11-18 18:35:58
639Authentication / Public key infrastructure / Federal Register / Cryptography / Federal Depository Library Program / United States Government Printing Office

Microsoft Word - AuthenticationWhitePaperFinal.doc

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
640Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
UPDATE