Key authentication

Results: 993



#Item
831Cryptography / Notary public / Apostille convention / Authentication / Public key certificate / Digital signature / Civil law / Notary / Law

DOC Document

Add to Reading List

Source URL: www.sos.state.tx.us

Language: English - Date: 2014-01-23 10:51:15
832Public-key cryptography / Electronic commerce / Authentication / Identity document / Public key certificate / Digital signature / Cryptography / Notary / Key management

PDF Document

Add to Reading List

Source URL: fms.treas.gov

Language: English - Date: 2007-08-27 14:14:14
833Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-01-06 14:07:16
834FIPS 201 / Standards / Data security / Authentication / Smart card / Cryptographic key types / X.509 / Information security / Cryptography / Security / Public-key cryptography

NIST SP[removed], Interfaces for Personal Identity Verification Part 1: End-Point PIV Card Application Namespace, Daata Model and Representation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-07 13:49:36
835Key management / Access control / Authentication / United States Government Printing Office / Federal Depository Library Program / Cryptographic hash function / Federal Digital System / Digital signature / Cryptography / Notary / Public-key cryptography

Overview of GPO’s Authentication Program For more than 150 years, the core mission of the U.S. Government Printing Office (GPO), Keeping American Informed, has remained unchanged. Since 1861 users have looked to GPO as

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-06-15 07:11:55
836Computing / Public-key cryptography / Access control / IEEE 802.1X / X.509 / Password / Kerberos / Authentication / Cloud computing / Cryptography / Computer network security / Security

Emerging Applications IoT Authentication email

Add to Reading List

Source URL: www.ieee802.org

Language: English - Date: 2014-07-15 18:59:28
837Notary / Packaging / United States Government Printing Office / Public key infrastructure / Federal Depository Library Program / Cryptography / Access control / Authentication

Version Control White Paper Outline

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-01-06 14:07:16
838Notary / Electronic documents / Access control / Authentication / Packaging / Key management / Portable Document Format / Digital signature / Digital Signature and Electronic Authentication Law / Cryptography / Security / Civil law

PKI System Administration

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-01-06 14:07:16
839Authentication / Notary / Packaging / United States Government Printing Office / Public Printer of the United States / Public key infrastructure / Cryptography / Key management / Access control

National Bibliography of U

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-01-06 14:07:16
840Revocation list / Public key certificate / Certificate authority / Online Certificate Status Protocol / Root certificate / Public key infrastructure / Certificate policy / Data Validation and Certification Server / Cryptography / Public-key cryptography / Key management

CERTIFICATION AUTHORITY CDC - LEGALIA CERTIFICATION POLICY AUTHENTICATION TEMPLATE OR

Add to Reading List

Source URL: www.caissedesdepots.fr

Language: English - Date: 2012-04-02 12:34:22
UPDATE