Key signature

Results: 1754



#Item
21Cryptography / Internet / Computing / Internet protocols / Internet Standards / Domain name system / Key management / Public-key cryptography / Domain Name System Security Extensions / Digital signature / Zone file

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
22Cryptography / Signature / Computer law / Cryptography standards / Records management technology / Public-key cryptography / Cryptomathic / EIDAS / Digital signature / Qualified electronic signature / Electronic signature / Key management

www.t hales-esecurity.com SECURE YOUR CUSTOMERS’ ONLINE JOURNEY WITH A CENTRALIZED SOLUTION FOR QUALIFIED ELECTRONIC SIGNATURE Solution Benefits • Give your customers freedom to sign transactions and

Add to Reading List

Source URL: www.kyos.ch

Language: English - Date: 2016-07-26 10:21:56
23Cryptography / Computer access control / Signature / Computer law / E-commerce / Cryptography standards / Authentication / Biometrics / Electronic signature / RSA SecurID / Public key certificate / Qualified electronic signature

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-06-27 03:25:11
24Cryptography / Public-key cryptography / Communications protocol / Data transmission / Digital signature / Short Message Service / Adversary / Peer-to-peer / Secure multi-party computation

A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-03-28 14:11:04
25Cryptography / Public-key cryptography / Records management technology / Signature / Cryptographic hash functions / Error detection and correction / Hash function / Crypt / Electronic signature / Digital signature

eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
26Cryptography / E-commerce / Signature / Computer law / Computer access control / Public key infrastructure / Authentication / Public key certificate / Electronic signature

Zentrum für sichere Informationstechnologie – Austria Secure Information Technology Center – Austria A-1030 Wien, SeidlgasseTel.: (+–0 Fax: (+–66 DVR:

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-09-02 03:28:44
27Cryptography / Public-key cryptography / Key management / Konrad Zuse / Mechanical computers / Elliptic curve cryptography / Radio-frequency identification / Key / Z2 / Z1 / Digital signature

Proceedings - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:43:24
28Cryptography / Security / Computer security / Computer access control / Public-key cryptography / Electronic documents / Notary / SAFE-BioPharma Association / Identity management / Digital signature / SAFE / Authentication

VASCO MYDIGIPASS Gains SAFE-BIOPHARMA Full-Service Credential Service Provider Certification OAKBROOK TERRACE, IL and TENAFLY, NJ – August 10, VASCO Data Security International, Inc. (NASDAQ: VDSI), a global le

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-08-10 11:17:32
29Cryptography / Signature / Cryptography standards / Computer law / Public-key cryptography / E-commerce / ETSI / Trust service provider / Public key certificate / Electronic signature / X.509 / Common technical regulation

ENV2Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 5: QCStatements

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-06-17 07:25:26
30Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:37:31
UPDATE