Key signature

Results: 1754



#Item
251Cyberwarfare / Mathematics / Schnorr signature / NP / Digital signature / RSA / Public-key cryptography / Cryptography / Applied mathematics

Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-06-07 15:20:20
252Common law / Taxation in the United States / Inheritance / Trust law / Social Security / Public key certificate / Medallion signature guarantee / Postage stamp / Cheque / Law / Civil law / Equity

PDF Document

Add to Reading List

Source URL: www.ally.com

Language: English - Date: 2013-12-19 16:32:52
253Digital signature / Digital Signature Algorithm / SHA-2 / SHA-1 / RSA / FIPS 140-2 / Public key certificate / Cryptography / Public-key cryptography / Elliptic Curve DSA

PDF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:18:14
254Public key certificate / Certificate authority / Electronic signature / Digital signature / Electronic Signatures in Global and National Commerce Act / X.509 / Uniform Electronic Transactions Act / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: rechtsinformatik.jura.uni-sb.de

Language: English - Date: 2007-09-11 09:44:04
255Key management / Civil law / Digital signature / Notary / Computing / X Window System / World Wide Web / Software / Cryptography / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.xsmiles.org

Language: English - Date: 2010-11-09 00:23:48
256Legal professions / Agency law / Notary / Legal entities / Law of agency / Corporation / Medallion signature guarantee / Public key certificate / Corporate resolution / Law / Business law / Business

PDF Document

Add to Reading List

Source URL: www.ally.com

Language: English - Date: 2013-12-19 16:23:36
257Civil law / Digital signature / Key management / Post-quantum cryptography / Hash function / Stateless / Cyberwarfare / Applied mathematics / Cryptography / Public-key cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:46:07
258Digital signature / Key management / Notary / Group signature / Model theory / Structure / Parity of a permutation / Cryptography / Mathematics / Group theory

PDF Document

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-27 08:32:48
259Public-key cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash function / Hash tree / Collision attack / RSA / MD5 / Cryptography / Hashing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
260Enduser / Digital signature / Mobile signature / Swisscom / Cryptography / Public-key cryptography / PKCS

PDF Document

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2015-03-12 04:50:22
UPDATE