Key signature

Results: 1754



#Item
461Civil law / Digital signature / Notary / Cyberwarfare / Security / Cryptography / Public-key cryptography / Key management

Improved Security for Linearly Homomorphic Signatures: A Generic Framework David Mandell Freeman Stanford University, USA PKC 2012

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2012-06-07 18:56:29
462Internet / Message transfer agent / MX record / Anti-spam techniques / Email authentication / Email / Computer-mediated communication / Computing

An Email Signature System for Eliminating Spam Robert Rose November 9, 2004 Abstract For my project, I propose to create an email client that incorporates public key / private key encryption to digitally sign email as it

Add to Reading List

Source URL: www.robertwrose.com

Language: English
463Notary / Electronic commerce / Digital signature / Non-repudiation / Public key infrastructure / Electronic signature / Cryptographic hash function / Public key certificate / Electronic business / Cryptography / Public-key cryptography / Key management

Singapore Journal of International & Comparative Law[removed]pp 183–200 Digital Signatures, Certification Authorities: Certainty in the Allocation of Liability Yee Fen Lim∗

Add to Reading List

Source URL: www.commonlii.org

Language: English - Date: 2010-03-01 06:47:15
464Electronic documents / Electronic commerce / S/MIME / Digital signature / Certificate authority / Revocation list / Email / RSA / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

CS255: Cryptography and Computer Security Winter 2006 Programming Project #2 Due: Monday, March 13th, 2006, 11:59 pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-28 04:14:48
465Dan Boneh / RSA / Digital signature / Cryptography / Public-key cryptography / Homomorphic encryption

Homomorphic Signatures for Polynomial Functions Dan Boneh and David Mandell Freeman Stanford University, USA Séminaire de Crypto de l’ENS

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-04-01 19:30:54
466Cryptography / Civil law / Notary / Email / Digital signature / Cyberwarfare / Internet / Electronic documents / Public-key cryptography / Key management

DIVISION OF FACILITIES MANAGEMENT KEY ISSUE RECORD To: Campus Services Manager – Email [removed] Key Custodian: ____________________________________ Contact Tel: ____________________

Add to Reading List

Source URL: www.csu.edu.au

Language: English - Date: 2013-09-18 23:40:40
467Computing / Network architecture / Key management / Internet standards / DNSSEC / Domain Name System Security Extensions / DNS spoofing / Dan Kaminsky / Trust anchor / Internet / Domain name system / Internet protocols

Product Description DNSSEC Management Highlights Why DNSSEC? • Simplified signature of zones

Add to Reading List

Source URL: www.efficientip.com

Language: English - Date: 2015-04-02 12:00:21
468Civil law / Australian property law / Conveyancing / Law in the United Kingdom / Real property law / Public key certificate / Digital signature / Cyberwarfare / Key management / Public-key cryptography / Law

www.lpi.nsw.gov.au Electronic Conveyancing National Law (NSW) Section 23 NSW PARTICIPATION RULES

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2014-07-09 22:28:14
469Notary / Digital signature / Electronic signature / Public key certificate / Non-repudiation / Signature / Certificate authority / Authentication / ABA digital signature guidelines / Cryptography / Public-key cryptography / Key management

Digital Signature Guidelines - Tutorial Page 1 of 7 HOME SEARCH JOIN CLE ABA STORE

Add to Reading List

Source URL: e-ammar.net

Language: English - Date: 2010-08-08 07:50:20
470Consumer protection / Computer law / Law / Computing / Online shopping / Electronic signature / Legal aspects of computing / Competition and Consumer Act / Phishing / Business / Consumer protection law / Electronic commerce

Article: Australian and regional regulatory responses to the key challenges of consumer protection in electronic commerce (March 2008)

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2008-03-06 00:36:39
UPDATE