Key signature

Results: 1754



#Item
421Public-key cryptography / National identification numbers / Certificate policy / Electronic Signatures in Global and National Commerce Act / Australian Business Number / Public key certificate / Cryptography / Key management / Taxation in Australia

eSign Australia Limited eSign Australian Business Number – Digital Signature Certificate Certificate Policy Statement

Add to Reading List

Source URL: gatekeeper.esign.com.au

Language: English - Date: 2004-08-06 01:11:24
422Revocation list / Certificate server / Public key infrastructure / Certificate policy / Public key certificate / Certificate authority / Trusted third party / Digital signature / X.509 / Cryptography / Public-key cryptography / Key management

Digital Signature x Introduction

Add to Reading List

Source URL: www.courteorders.com

Language: English - Date: 2012-06-27 02:36:21
423Peer-to-peer computing / Digital signature / Threshold cryptosystem / RSA / Elliptic Curve DSA / Paillier cryptosystem / XTR / Homomorphic encryption / Digital Signature Algorithm / Cryptography / Public-key cryptography / Bitcoin

Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme Steven Goldfeder Princeton University [removed] Rosario Gennaro

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-08 09:13:05
424Law / Medallion signature guarantee / Notary public / Public key certificate / Digital signature / BlackRock / Cryptography / Civil law / Notary

Certificate of Incumbency Form Information Use this form: Mail this form, along with any other required documents to:

Add to Reading List

Source URL: www.blackrock.com

Language: English - Date: 2014-05-05 19:33:30
425Notary / Escrow / Digital signature / Key escrow / Authentication / Cryptography / Key management / Public-key cryptography

CS255 Programming Project: The Authenticator The project focuses on Anonymous Authentication. Our objective is to enable a person to authenticate himself to a service without revealing his identity. For example, the Wal

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-20 01:28:17
426Public-key cryptography / XAdES / European Telecommunications Standards Institute / Public key certificate / XML / Electronic signature / Uniform resource identifier / Digital signature / CAdES / Cryptography / Cryptography standards / Key management

ETSI TS[removed]V1[removed]Technical Specification Electronic Signatures and Infrastructures (ESI); Trusted Lists

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2013-06-19 10:17:43
427Key / Lock / Bitting / Digital signature / Locksmithing / Security engineering / Security

Reset Form Print Form University of Manitoba Key Approval Form

Add to Reading List

Source URL: www.umanitoba.ca

Language: English - Date: 2013-04-26 15:04:55
428Public-key cryptography / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / YAK / Electronic money / Digital signature / Elliptic Curve DSA / MQV / Shared secret / Cryptography / Cryptographic protocols / Bitcoin

Authenticated Key Exchange over Bitcoin Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao Newcastle University, UK {patrick.mccorry,siamak.shahandashti,dylan.clarke,feng.hao}@ncl.ac.uk Abstract. Bitcoin is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-03 08:37:15
429Cryptographic software / PGP / Passphrase / Key generation / X.509 / Key / Digital signature / Session key / Crypt / Cryptography / Key management / Public-key cryptography

Authora Inc[removed]removed] http://www.authora.com COPYRIGHT © [removed]AUTHORA INC. ALL RIGHTS RESERVED. NO PART OF THIS PUBLICATION MAY BE REPRODUCED,

Add to Reading List

Source URL: authora.com

Language: English - Date: 2013-03-28 16:03:22
430Digital signature / Rabin signature algorithm / RSA / Diffie–Hellman key exchange / ElGamal encryption / Schnorr signature / Euclidean algorithm / Naccache–Stern cryptosystem / ElGamal signature scheme / Cryptography / Public-key cryptography / XTR

Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-05-21 14:56:23
UPDATE