Key authentication

Results: 993



#Item
691Identity management / Public-key cryptography / Key management / Access control / Authentication / PERMIS / Authorization certificate / Public key certificate / Electronic authentication / Cryptography / Security / Computer security

ICAM Lexicon 30 May 2013 Prepared by: National Security Systems Identity, Credentialing and Access Management Focus Group Version 1.0

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2013-05-31 06:51:38
692FIPS 201 / Standards / Identity document / E-Authentication / Smart card / Authentication / Public key infrastructure / I-9 / Cryptography / Security / Federated identity

Personal Identity Verification Interoperability for Non-Federal Issuers

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2010-08-02 14:43:36
693Block cipher modes of operation / CMAC / Key Wrap / Block cipher / Ciphertext / Triple DES / Advantage / Cryptography / Message authentication codes / Finite fields

The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption Draft 0.32 — Aug 20, 2007 Phillip Rogaway

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:00:27
694Initialization vector / Block cipher / Padding / Ciphertext / Cipher / Symmetric-key algorithm / Feistel cipher / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Authenticated encryption

NIST-submissionRev.dvi - Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 16:07:21
695United States Department of Homeland Security / Identity management / Computer security / Key management / FIPS 201 / Standards / Validation / Authentication / Federal Emergency Management Agency / Public safety / Cryptography / Emergency management

Privacy Impact Assessment

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2011-06-20 16:27:22
696Shared secret / Public-key cryptography / Key-agreement protocol / Transport Layer Security / Provisioning / Authentication / Cryptography / Cryptographic protocols / XKMS

http://www.openauthentication.org/drafts/draft-hallambaker-oa...

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:07
697Civil law / Access control / Authentication / Notary / Packaging / Verification and validation / Public key certificate / Certificate policy / Key management / Security / Public-key cryptography

CHUID Authentication Reader (Contactless) Test Procedure

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2014-01-15 10:20:03
698Pharmaceutical industry / Systems engineering / Verification and validation / Public key certificate / Certificate policy / Validator / Computing / Technology / Business / Key management / Public-key cryptography / Food safety

CHUID Authentication Reader (Contactless) Test Procedure

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2014-01-15 10:18:17
699Public key certificate / Email / User / Portable Document Format / Transaction authentication number / Computing / Electronic documents / Password

(Insert State/Agency Name) National NetDMR Implementation via CDX CROMERR System Checklist Template last updated[removed] Checklist prepared: Insert date

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2013-08-08 16:37:09
700Public-key cryptography / Internet privacy / Encryption software / Encryption / Email encryption / Data Encryption Standard / Transport Layer Security / Disk encryption / Key size / Cryptography / Email authentication / Cryptographic software

County of Sacramento Inter-Departmental Correspondence For the Agenda of: June 2, 2005 Date:

Add to Reading List

Source URL: www.technology.saccounty.net

Language: English - Date: 2012-04-23 19:09:14
UPDATE