Key signature

Results: 1754



#Item
931Electronic commerce / Key management / Public key certificate / Signature / Cryptography / Security / Public-key cryptography

COA Financial Certification Form for International Students[removed]Gender: □ M □ F 1. Surname ________________________________ First name _________________

Add to Reading List

Source URL: www.coa.edu

Language: English - Date: 2014-10-30 10:36:27
932Message authentication codes / Internet protocols / Secure communication / Block cipher / Key Wrap / Data Encryption Standard / SHA-2 / HMAC / Digital signature / Cryptography / Cryptographic software / Cryptography standards

NIST Cryptographic Standards Program Bill Burr [removed] Dec 4, 2002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-04 01:00:00
933Cryptographic protocols / Key / Data security / Digital signature / Public key certificate / Trusted timestamping / Transient-key cryptography / Implicit certificate / Cryptography / Key management / Public-key cryptography

Secure… Cryptographic Time-Stamps Through Transient Key Technology By: Paul Doyle of ProofSpace

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
934Cryptographic software / Computer security / FIPS 140-2 / S/MIME / FIPS 140 / Digital signature / Kernel / CryptGenRandom / Microsoft CryptoAPI / Cryptography / Cryptography standards / Public-key cryptography

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
935Key management / Notary / Public-key cryptography / Cyberwarfare / Civil law / Cryptography / Digital signature

Microsoft Word - Konneker_Fund_Guidelines_2015.docx

Add to Reading List

Source URL: www.ohio.edu

Language: English - Date: 2014-08-11 13:58:54
936Notary / Cryptography / Digital signature / Cyberwarfare / Key management / Public-key cryptography / Civil law

Fisk University Banner Account Request Form * Required User Identification: * Last Name: _____________________________________

Add to Reading List

Source URL: www.fisk.edu

Language: English - Date: 2013-08-20 13:09:54
937Parallel computing / Cryptography / Civil law / Cambridge Rindge and Latin School / Parallel Virtual Machine / Validation / Digital signature / Cyberwarfare / Public-key cryptography / Key management / Computing

Path Validation Testing The Path Validation Module Protection Profiles and the Federal Certificate and CRL Profile David Cooper June 23, 2003

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
938FIPS 140-2 / FIPS 140 / Digital Signature Algorithm / Authentication / Cryptography / Cryptography standards / Public-key cryptography

0562A238 SGSS FIPS Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
939Cryptographic hash functions / Key management / X.509 / Digital signature / Validation / SHA-2 / SHA-1 / Cambridge Rindge and Latin School / Cryptography / Public-key cryptography / Cryptographic protocols

Path Validation Testing NIST Recom m endation for X.509 Path Validation David Cooper M ay 19, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
940Packaging / Key management / Digital signature / Authentication / Tamper resistance / Cryptography / Notary / Public-key cryptography

lefttop00State of Maine Department of Administrative and Financial Services Office of Information Technology Request for Acceptance of Digital Signature Product

Add to Reading List

Source URL: www.maine.gov

Language: English - Date: 2014-07-31 07:03:31
UPDATE