Key signature

Results: 1754



#Item
181Key management / Electronic commerce / Bitcoin / Digital signature / Consensus / Blind signature / Don Mills Middle School / Random oracle / Key / Cryptography / Public-key cryptography / Financial cryptography

On Stake and Consensus Andrew Poelstrafe81626

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English
182Security / Cyberwarfare / Data modeling / Civil law / Digital signature / Key / Unique key / Cryptography / Key management / Public-key cryptography

Maryland Institute College of Art Key Request Form Submit fully signed and completed request Directions:

Add to Reading List

Source URL: www.mica.edu

Language: English - Date: 2015-06-02 17:47:10
183Anonymity / Public-key cryptography / Group signature / Security token / Internet privacy / User / Blacklist / Trusted Computing / Digital credential / Cryptography / Privacy-enhancing technologies / Pseudonymity

Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-03-09 14:36:12
184Cryptographic protocols / Electronic commerce / X.509 / Transport Layer Security / ID-based cryptography / ID-based encryption / Public key infrastructure / Grid Security Infrastructure / Digital signature / Cryptography / Key management / Public-key cryptography

Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {h.lim, kenny.paterson}@rhul.ac.uk

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-09-30 07:23:50
185Key management / Notary / Public-key cryptography / Signature / Microsoft Word / Cryptography / Security / Digital signature

Example of a Digitally Signed Document with a Single Signature This document is an example of how to create a Microsoft Word document that will be digitally signed by one person.

Add to Reading List

Source URL: militarycac.com

Language: English - Date: 2015-03-29 00:07:33
186Electronic documents / Electronic commerce / Digital signature / Electronic signature / Public key certificate / Signature / Public key infrastructure / CAdES / Cryptography / Public-key cryptography / Key management

Multilingual User Interface ScreenTip

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2013-02-07 21:37:40
187Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-11-13 20:20:01
188Key management / Digital signature / Electronic signature / Non-repudiation / Public key certificate / Signature / CAdES / Cryptographic hash function / Digital signatures and law / Cryptography / Public-key cryptography / Notary

Abhinav International Monthly Refereed Journal of Research In Management & Technology Volume II, March’13 ISSN –

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2013-12-17 06:25:33
189Hashing / Search algorithms / Schnorr signature / Digital signature / Random oracle / One-way function / Universal hashing / RSA / Hash function / Cryptography / Public-key cryptography / Cryptographic hash functions

Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number G

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-06-27 15:00:00
190Public key certificate / Certificate authority / Electronic signature / Digital signature / Electronic Signatures in Global and National Commerce Act / X.509 / Uniform Electronic Transactions Act / Cryptography / Public-key cryptography / Key management

ELECTRONIC TRANSACTIONS ORDINANCE A6 2000

Add to Reading List

Source URL: unpan1.un.org

Language: English - Date: 2013-01-25 12:42:05
UPDATE