Message authentication

Results: 402



#Item
191Extended SMTP / Gmail / SMTP / Sendmail / Message transfer agent / Simple Mail Transfer Protocol / SMTP Authentication / Computer-mediated communication / Email / Computing

Booked gmail setup These are the steps I took to set up gmail to work with Booked, at the time of this writing, reminders and messages to myself were not working, but all other admins were getting messages. Step one is t

Add to Reading List

Source URL: www.bookedscheduler.com

Language: English - Date: 2014-09-23 19:46:00
192Message authentication codes / PMAC / Ute people

Microsoft Word - CPD Seminar Registration Form New

Add to Reading List

Source URL: www.scmabc.ca

Language: English - Date: 2013-11-27 13:48:28
193Red / Message authentication codes / PMAC / Arkansas

Microsoft Word - PM Recommendations Approved[removed]by Commissioner

Add to Reading List

Source URL: static.ark.org

Language: English - Date: 2013-04-02 16:45:04
194Message authentication codes / Marketing / Supply chain management / Edmonton / Supply chain / PMAC / Web conferencing / Business / Technology / Management

Positive Feedback! “Absolutely amazing what (AIPMAC is) doing and the progress made by the Institute!!! Well done and congrats … it’s great for the profession and the members” – Leon Harder, FAIPMAC We welcome

Add to Reading List

Source URL: www.scmaab.ca

Language: English - Date: 2013-01-21 17:11:09
195Message authentication codes / HMAC / Internet protocols / Cryptographic hash functions / Cryptographic protocols / Collision attack / MD4 / MD5 / SHA-1 / Cryptography / Error detection and correction / Hashing

Forgery and Partial Key Recovery attacks on HMAC and NMAC using Hash Collisions 2nd NIST Hash Function Workshop Scott Contini Macquarie University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:27:16
196Hashing / Message authentication codes / Padding / Hash function / MD5 / One-way compression function / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic Hash Workshop[removed]Enhancing the MD-Strengthening & Designing Scalable 1-Way Hash Families

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:30:02
197Computer architecture / Software / Message authentication codes / Hashing / FIPS 140 / HMAC / Vidyo / Zeroisation / Critical Security Parameter / Cryptography standards / Cryptography / Computing

1B - Vidyo Cryptographic Security Kernel Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-20 10:16:00
198Cryptosystem / Key size / SHA-1 / Data Encryption Standard / FIPS 140-2 / Message authentication code / Advanced Encryption Standard / Public-key cryptography / Transport Layer Security / Cryptography / Key management / Cryptographic hash functions

Securit-e-Doc® SITT® CryptoSystem FIPS[removed]Non-Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
199FIPS 140 / PKCS / Critical Security Parameter / Advanced Encryption Standard / Message authentication code / Key management / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - 5a - PSD - OTH - Security Policy - Netherlands_1_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-07-06 09:53:00
200Key management / HMAC / Cryptographic hash function / SHA-2 / FIPS 140-2 / Key / Advanced Encryption Standard / Cryptography / Hashing / Message authentication codes

Microsoft Word - 01d - EPCL_Security_Policy_2010-CCS RedlinedD4.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
UPDATE