Key signature

Results: 1754



#Item
161Digital signature / Notary / Electronic signature / United Nations Commission on International Trade Law / Public key certificate / Information security / Cryptography / Key management / Public-key cryptography

Main Legal Issues Concerning Information Security ENISA-FORTH Summer School in Network and Information Security Heraklion, September 2008

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:06
162

Protection profiles for Secure signature creation device — Part 2: Device with key generation

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:29:05
    163Zero-knowledge proof / RSA / IP / Alice and Bob / XTR / Digital signature / Interactive proof system / Cryptography / Cryptographic protocols / Public-key cryptography

    CS 161 Computer Security Fall 2005

    Add to Reading List

    Source URL: www-inst.eecs.berkeley.edu

    Language: English - Date: 2005-12-13 23:10:13
    164Security token / Certificate authority / Public key certificate / Smart card / Universal Serial Bus / Digital signature / Digital ID / Two-factor authentication / Public key infrastructure / Cryptography / Public-key cryptography / Key management

    Office of Controller of Certification Rajan Raj Pant Controller Government of Nepal

    Add to Reading List

    Source URL: www.cca.gov.np

    Language: English - Date: 2014-06-01 07:03:56
    165Post-quantum cryptography / Error detection and correction / Cryptographic hash function / Merkle signature scheme / Digital signature / Hash function / Cryptography / Public-key cryptography / Hashing

    draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

    Add to Reading List

    Source URL: tools.ietf.org

    Language: English - Date: 2015-04-08 10:22:54
    166Public-key cryptography / Protection Profile / Common Criteria / Electronic signature / Public key certificate / Evaluation Assurance Level / Integrity / CAdES / Ethics / Evaluation / Computer security / Key management

    Microsoft Word - WD1 EN_14169-4_(E)_v1.0.1_KGTCCGA.doc

    Add to Reading List

    Source URL: sogis.eu

    Language: English - Date: 2013-02-14 10:25:38
    167Banking / Cryptographic protocols / Blind signature / Anonymity / Cheque / Money supply / RSA / United States dollar / Alice and Bob / Cryptography / Public-key cryptography / Financial cryptography

    U.C. Berkeley CS276: Cryptography Professor David Wagner Lecture 28 April 27, 2006

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:43
    168Dotted note / Accidental / Note / Chord / Tuplet / Tie / Key signature / Time signature / A / Music / Musical notation / ABC notation

    ABC2MTEX An easy way of transcribing folk and traditional music Version 1.6.1 – January ’97 Chris Walshaw School of Maths,

    Add to Reading List

    Source URL: mirror.math.ku.edu

    Language: English - Date: 2008-09-17 03:09:48
    169Digital signature / Public key certificate / Public key infrastructure / Authentication / Records management / Certificate authority / Cryptographic protocol / Digital Postmarks / Trusted timestamping / Cryptography / Public-key cryptography / Key management

    時刻認証基盤ガイドライン

    Add to Reading List

    Source URL: www.dekyo.or.jp

    Language: English - Date: 2015-06-17 21:01:44
    170Dotted note / Accidental / Note / Chord / Tuplet / Tie / Key signature / Time signature / A / Music / Musical notation / ABC notation

    ABC2MTEX An easy way of transcribing folk and traditional music Version 1.6.1 – January ’97 Chris Walshaw School of Maths,

    Add to Reading List

    Source URL: ftp.rrze.uni-erlangen.de

    Language: English - Date: 2008-09-17 03:09:48
    UPDATE