Key code

Results: 1646



#Item
401Public key certificate / Public-key cryptography / Electronic commerce / Key management

International Student - Notification of Non-Attendance CRICOS provider Code: 00012G

Add to Reading List

Source URL: www.holmesglen.edu.au

Language: English - Date: 2014-11-23 23:54:10
402Electronic commerce / Payment systems / Credit card / Identity document / Public key certificate / Cheque / Belgian national identity card / Cryptography / Security / Business

Births Deaths and Marriages Phone[removed]Email [removed] Web www.justice.tas.gov.au/BDM STARS Product Code DSC / DSP

Add to Reading List

Source URL: www.justice.tas.gov.au

Language: English - Date: 2014-02-16 18:12:08
403Electronic signature / Cryptographic hash function / Hysteresis / Elliptic Curve DSA / Signature / SHA-1 / Message authentication code / RSA / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:46
404Accessibility / Environmental design / Human geography / Knowledge / Affordable housing / United States Department of Housing and Urban Development / Urban development

Accessible Accessible Multifamily Housing Key Code Requirements from Volume 1-C[removed]of the North Carolina State Building Code HOUSING MULTIFAMILY HOUSING MULTIFAMILY HOUSING MULTIFAMILY HOUSING MULTIFAMILY HOUSING

Add to Reading List

Source URL: www.ncsu.edu

Language: English - Date: 2010-01-21 14:33:49
405Credit history / Credit card / Credit score / Fair and Accurate Credit Transactions Act / Fair Credit Reporting Act / Financial economics / Credit / Personal finance

Questions and Answers - Credit Reporting Privacy Code Amendment No 5 This note covers only a selection of topics – also see information paper and the amendment itself Key changes What are the most significant proposals

Add to Reading List

Source URL: www.centrix.co.nz

Language: English - Date: 2013-11-24 22:17:51
406Measurement / Public opinion / Psychometrics / Opinion poll / Margin of error / Random sample / Election verification exit poll / Straw poll / Statistics / Sampling / Survey methodology

Six key elements of the New Zealand Political Polling Code Why is there a New Zealand Political Polling Code? The New Zealand Political Polling Code (NZPPC) provides guidelines for conducting and reporting political pol

Add to Reading List

Source URL: www.mrsnz.org.nz

Language: English - Date: 2014-03-19 02:47:57
407Certificate authorities / Comodo Group / Electronic commerce / Computer security / Public key certificate / Code signing / Comodo / S/MIME / GlobalSign / Cryptography / Key management / Public-key cryptography

Cost-Effective PKI Certificates Give IT Powerful Control over Application Usage and a Seamless Experience for End Users When Open Finance Network needed Digital Client Authentication Certificates - one for every financia

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
408Comodo Group / Certificate authority / Certificate policy / Public key certificate / Public key infrastructure / Revocation list / X.509 / CA/Browser Forum / Code signing / Cryptography / Key management / Public-key cryptography

Microsoft Word - Comodo CA CPS 4.0 _2012-10-5_ CLEAN

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2014-02-03 11:07:21
409Certificate authorities / Comodo Group / Certificate policy / Comodo / Code signing / Public key certificate / Key generation / Cryptography / Key management / Public-key cryptography

Microsoft Word - CPS Amendment - Key Escrow3

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2011-11-10 11:53:15
410Computing / Data security / Computer security / Crime prevention / National security / Security service / Message authentication code / Virtual private network / Public-key cryptography / Computer network security / Cryptography / Security

The use of information technology standards to secure telecommunication networks

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-05-25 16:54:07
UPDATE