Key signature

Results: 1754



#Item
391Public key certificate / Revocation list / Certificate authority / Online Certificate Status Protocol / Root certificate / Public key infrastructure / Base / Digital signature / KPN / Cryptography / Public-key cryptography / Key management

Relying Party Agreement - versionThe Relying Party Agreement (RPA) below applies to certificates issued by KPN. However, the certificate that referred you to this page may have been issued by an organization with

Add to Reading List

Source URL: certificaat.kpn.com

Language: English - Date: 2014-04-28 08:01:51
392Cryptographic protocols / Time / Digital signature / Public key certificate / Revocation list / X.509 / Authorization certificate / Timestamp / Postage stamp / Cryptography / Public-key cryptography / Key management

General principles of digital signature verification 7th November 2002 Contents 1 Abstract

Add to Reading List

Source URL: www.timestamp.cyber.ee

Language: English - Date: 2003-01-29 09:32:12
393Cryptographic protocols / Digital signature / RSA / Diffie–Hellman key exchange / Key-agreement protocol / Cypherpunk / Perfect forward secrecy / Key / Public key infrastructure / Cryptography / Key management / Public-key cryptography

Two Remarks on Public Key Cryptology Ross Anderson University of Cambridge Computer Laboratory, New Museums Site, Pembroke Street, Cambridge CB2 3QG, UK

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2003-11-23 22:40:31
394Electronic commerce / Financial cryptography / Digital credential / Credential / Electronic authentication / Digital signature / Blind signature / Cryptographic protocol / Authentication / Cryptography / Identity management / Public-key cryptography

A Technical Overview of Digital Credentials Dr. Stefan Brands Credentica February 20, 2002 Abstract

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2007-02-16 10:07:45
395Public-key cryptography / Key management / Cryptographic protocols / Payment systems / Cryptography / Bitcoin / Peer-to-peer computing

We’ve found an error in our paper. In the threshold signature scheme that we used, there are restrictions on the threshold value. In particular if the key is shared over a degree t polynomial, then 2t + 1 players (not

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-06-03 22:44:00
396Cryptographic protocols / Notary / Digital signature / X.509 / Public key certificate / Pretty Good Privacy / Certificate authority / Electronic signature / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Signatures: an Interface between Law and Technology Ben Laurie Nicholas Bohm

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2006-10-26 22:06:14
397Public key certificate / Root certificate / Digital signature / HTTP Secure / Non-repudiation / Certificate authority / Certificate server / Cryptography / Public-key cryptography / Key management

VITA self-sign root digital certificate The VITA self-signed root digital certificate has been made available to the public to allow any entity to verify the digital signature of an electronic message signed using a dig

Add to Reading List

Source URL: www.vita.virginia.gov

Language: English - Date: 2011-10-12 15:48:54
398Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-08-01 14:09:59
399International trade / Electronic commerce / Public key certificate / Digital signature / Export / Signature / Seal / User / Cryptography / Public-key cryptography / Key management

END USER DECLARATION Import and Export (Control of Chemicals, Biological and Nuclear Export) OrderIn accordance with the regulations of the State of Israel which stipulate that the granting of an export lic

Add to Reading List

Source URL: www.moital.gov.il

Language: English - Date: 2015-04-16 16:36:57
400Notary / Computer law / Electronic signature / Key management / Title 21 CFR Part 11 / Password / Electronic Signatures in Global and National Commerce Act / Validation / Digital signature / Cryptography / Security / Pharmaceutical industry

LabArchives and 21 CFR Part 11 Background and Introduction 21 CFR Part 11 contains the regulations of the US Food and Drug Administration with regard to electronic records and electronic signatures. This document was pre

Add to Reading List

Source URL: www.labarchives.com

Language: English - Date: 2013-03-11 22:22:24
UPDATE