Key signature

Results: 1754



#Item
211Key management / Computer security / Digital signature / Electronic signature / Non-repudiation / X.509 / Public key infrastructure / Signature / Public key certificate / Cryptography / Public-key cryptography / Notary

PDF Document

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:01:39
212Civil law / Digital signature / Notary / Key / Security / Cyberwarfare / Key management / Public-key cryptography / Cryptography

DIRECTIONS: KEY REQUEST FORM UNIVERSITY OF NEW HAVEN 1.

Add to Reading List

Source URL: www.newhaven.edu

Language: English
213Business / Banking / Loans / Mortgage modification / Financial services / Mortgage fraud / Loan / Workflow / Loan origination / Mortgage / Personal finance / Finance

e-delivery | e-signature | e-collaboration | e-workflow | e-business e4506-T – Income Verification Integrated With Disclosures Simple. Cost-effective. Fast. KEY FEATURES

Add to Reading List

Source URL: www.elynx.com

Language: English - Date: 2013-05-21 19:19:47
214Key management / Internet protocols / Public-key cryptography / Internet standards / Domain Name System Security Extensions / Digital signature / Zone file / Keysigning / DNS zone / Cryptography / Domain name system / Internet

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
215Digital signature / Notary / Key / Cryptography / Public-key cryptography / Key management

Short Signatures with Short Public Keys From Homomorphic Trapdoor Functions Jacob Alperin-Sheriff School of Computer Science Georgia Tech

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:16:22
216S/MIME / Public key infrastructure / Email / Digital signature / Revocation list / Certificate authority / Web of trust / PKCS / Transport Layer Security / Cryptography / Public-key cryptography / Key management

Securing E­mail with Digital Certificates  Author: Steve Moitozo <> Created: Revised: Revision: 4

Add to Reading List

Source URL: www.geekwisdom.com

Language: English - Date: 2009-02-04 13:42:40
217Routing protocols / Public-key cryptography / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Digital signature / Convergence / RSA / Internet / Network architecture / Computing

Simulation Modelling Practice and Theory–216 www.elsevier.com/locate/simpat Evaluation of efficient security for BGP route announcements using parallel simulation David M. Nicol

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:44:25
218Cryptography / Computing / Digital signature / Public-key cryptography / Structure / Append / Parity of a permutation / Signature / Sha / Mathematics / Model theory / Universal algebra

Secure Efficient History-Hiding Append-Only Signatures in the Standard Model Benoˆıt Libert Marc Joye

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-31 04:04:52
219Cyberwarfare / Applied mathematics / Digital signature / RSA / ID-based encryption / Information security / Elliptic curve cryptography / Cryptography / Public-key cryptography / Security

1 BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems Attila A. Yavuz and Peng Ning Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
220RSA / Cryptography / Public-key cryptography / Digital signature

Background The EDL Scheme Our Scheme Conclusion An Efficient CDH-based Signature Scheme

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-29 14:39:25
UPDATE