PKCS 11

Results: 34



#Item
11

PKCS #11 Cryptographic Token Interface Historical Mechanisms Specification Version 2.40 Errata 01 OASIS Approved Errata

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2016-05-13 12:00:00
    12

    PKCS #11 Cryptographic Token Interface Profiles Version 2.40 OASIS Standard

    Add to Reading List

    Source URL: docs.oasis-open.org

    Language: English - Date: 2015-04-14 12:00:00
      13

      PKCS #11 Cryptographic Token Interface Base Specification Version 2.40 Committee Specification 01

      Add to Reading List

      Source URL: docs.oasis-open.org

      Language: English - Date: 2014-09-16 12:00:00
        14

        A Provably Secure PKCS#11 Configuration Without Authenticated Attributes Ryan Stanley-Oakes? University of Bristol Abstract. Cryptographic APIs like PKCS#11 are interfaces to trusted

        Add to Reading List

        Source URL: fc17.ifca.ai

        - Date: 2017-03-17 11:54:53
          15

          Formal Analysis of PKCS#11∗ St´ephanie Delaune, Steve Kremer and Graham Steel LSV, CNRS & INRIA & ENS de Cachan 61, avenue du Pr´esident WilsonCACHAN Cedex, FRANCE

          Add to Reading List

          Source URL: www.lsv.ens-cachan.fr

          - Date: 2008-04-23 06:56:19
            16

            Attacking and Fixing PKCS#11 Security Tokens Matteo Bortolozzo, Matteo Centenaro Riccardo Focardi and Graham Steel Universita` Ca’ Foscari, Venezia and LSV, INRIA & CNRS & ENS-Cachan

            Add to Reading List

            Source URL: www.lsv.ens-cachan.fr

            - Date: 2010-10-06 15:10:24
              17

              Attacking and fixing PKCS#11 Security Course, Ca’ Foscari, Security APIs

              Add to Reading List

              Source URL: secgroup.dais.unive.it

              - Date: 2016-04-28 05:10:58
                18

                Attacking and Fixing PKCS#11 Security Tokens M. Bortolozzo M. Centenaro Università Ca’ Foscari

                Add to Reading List

                Source URL: secgroup.dais.unive.it

                - Date: 2010-10-05 06:04:56
                  19

                  Securing PKCS#11 HSM Deployments Hardware-based cryptography is a core technology for controlling risk in potentially hostile environments such as mobile, cloud and Internet of things. However, choosing, configuring, dep

                  Add to Reading List

                  Source URL: cryptosense.com

                  Language: English - Date: 2016-02-22 08:08:30
                    20

                    SecretAgent® DAS 1.7 HSM Proxy Architecture Diagram Copyright© Information Security Corp. All rights reserved. HSM’s PKCS#11 API HSM

                    Add to Reading List

                    Source URL: www.infoseccorp.com.

                    - Date: 2008-04-30 20:01:00
                      UPDATE