Key signature

Results: 1754



#Item
711Digital signature / Commitment scheme / Random oracle / XTR / Public-key cryptography / BLS / Cryptography / Blind signature / Group signature

Full version of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report[removed]Limitations on Transformations from Composite-

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:28
712Civil law / Electronic commerce / Notary / Business / Law / Electronic signature / Public key certificate / Digital signature / Records management / Public-key cryptography / Cryptography / Key management

Advisory Circular Subject: Electronic Signatures and Electronic Exchange of the Authorized Release Certificate – Form One

Add to Reading List

Source URL: www.tc.gc.ca

Language: English - Date: 2012-03-26 09:15:22
713Notary / Marketing / Digital signature / Public-key cryptography / Franchising / Hilton / Comfort letter / Business / Cryptography / Civil law

Microsoft Word - LCL Execution Instructions[removed])

Add to Reading List

Source URL: hiltonworldwide.com

Language: English - Date: 2014-12-18 13:25:35
714Key management / Public-key cryptography / Autopen / Machines / Cheque / Separation of duties / Digital signature / Cryptography / Payment systems / Notary

SAM - CASH CHECK SIGNING MACHINES (Revised[removed]

Add to Reading List

Source URL: www.documents.dgs.ca.gov

Language: English - Date: 2014-10-29 11:38:18
715Notary / Marketing / Digital signature / Public-key cryptography / Franchising / Hilton / Comfort letter / Business / Cryptography / Civil law

Microsoft Word - LCL Execution Instructions[removed])

Add to Reading List

Source URL: www.hiltonworldwide.com

Language: English - Date: 2014-12-18 13:25:35
716Certificate policy / Public key certificate / Code signing / Certificate authority / Public key infrastructure / Entrust / Root certificate / Online Certificate Status Protocol / Digital signature / Cryptography / Public-key cryptography / Key management

FPKIMA Newsletter Fall 2014 Volume 1 Issue 2 INSIDE THIS ISSUE Federal Public Key Infrastructure – Federal

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2014-12-12 09:00:23
717Public-key cryptography / Random oracle / Perfect forward secrecy / Transport Layer Security / Standard model / Oracle machine / Key / Digital signature / Advantage / Cryptography / Cryptographic protocols / Key management

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model Florian Bergsma, Tibor Jager, and J¨org Schwenk Horst G¨ ortz Institute for IT Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 19:28:13
718Key management / Notary / Public-key cryptography / Cyberwarfare / Cryptography / Civil law / Digital signature

CSN Policy Signature Authorization Policy FIN 15.2 Effective Date: [removed]

Add to Reading List

Source URL: www.csn.edu

Language: English - Date: 2014-12-08 14:50:42
719Pairing / Digital signature / Blind signature / RSA / Cryptography / Public-key cryptography / Group signature

Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds? Gilles Barthe1 , Edvard Fagerholm1,2 , Dario Fiore1 , Andre Scedrov2 , Benedikt Schmidt1 , and Mehdi Tibouchi3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-11 07:29:19
720Key management / Computer network security / Password authentication protocol / Integrated Windows Authentication / Authentication / Revocation list / Digital signature / Parity of a permutation / Cryptography / Public-key cryptography / Notary

PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication Patrick P. Tsang† , Man Ho Au‡ , Apu Kapadia† , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2008-09-15 21:11:07
UPDATE