PKCS

Results: 351



#Item
201Computer file formats / Markup languages / Open formats / WS-Security / XML / SOAP / Abstract Syntax Notation One / OASIS / PKCS / Computing / Cryptography standards / Remote procedure call

1 3 Web Services Security XCBF Token Profile

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-11-25 19:42:22
202Archive formats / Cryptography standards / Keystore / Apache Tomcat / PKCS / EAR / XSLT / WAR file format / Meteor / Computing / Java enterprise platform / Public-key cryptography

Meteor Quick Setup Guide, Version[removed]How to Set Up Meteor 1. Download the Meteor software from the User Documentation section of www.MeteorNetwork.org. 2. Install Java SDK (see Appendix A).

Add to Reading List

Source URL: www.meteornetwork.org

Language: English - Date: 2013-05-09 10:13:43
203RSA / Digital signature / X.509 / Cryptography / Public-key cryptography / PKCS

The RSA Validation System (RSAVS) November 9, 2004 Sharon S. Keller National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
204Computer security / WS-Security / Internet protocols / Internet standards / X.509 / Public key certificate / PKCS / Security token / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Microsoft Word - oasis[removed]wss-x509-token-profile-1.0.doc

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-03-16 19:20:30
205Computer file formats / Markup languages / Open formats / WS-Security / XML / SOAP / Abstract Syntax Notation One / OASIS / PKCS / Computing / Cryptography standards / Remote procedure call

1 3 Web Services Security XCBF Token Profile

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-11-25 19:42:22
206FIPS 201 / Standards / PKCS / Elliptic curve cryptography / Key / Digital signature / Smart card / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - Crypto_Activities_Presentation_2010.pptx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 13:31:10
207Cryptographic hash functions / Key management / Time / Code signing / Public key certificate / Timestamp / SHA-2 / SHA-1 / PKCS / Cryptography / Public-key cryptography / Electronic commerce

Entrust Certificate Services Authenticode Signing User Guide

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-06-13 14:10:10
208Radiobiology / Radioactivity / Aging / Non-homologous end joining / Ku / DNA-PKcs / Ionizing radiation / Radiation therapy / DNA / Biology / Medicine / DNA repair

The Role of DNA double-strand break repair in cellular response to low

Add to Reading List

Source URL: lowdose.energy.gov

Language: English - Date: 2012-02-28 18:10:18
209Cryptographic protocols / Cryptographic software / Electronic commerce / X.509 / Certificate authority / Public key certificate / Root certificate / PKCS / OpenSSL / Cryptography / Public-key cryptography / Key management

PKI Layer Cake: New Collision Attacks Against The Global X.509 CA Infrastructure [Version[removed]Aug-2009 Dan Kaminsky, Director of Penetration Testing, IOActive Inc. Len Sassaman

Add to Reading List

Source URL: www.ioactive.com

Language: English
210Radiobiology / Cellular processes / Molecular genetics / Radioactivity / H2AFX / Non-homologous end joining / DNA-PKcs / Ionizing radiation / Radiation therapy / Biology / Medicine / DNA repair

Co-localisation of γ-H2AX and 53BP1 to sites of DNA double strand breaks following low- and high-LET irradiation of mammalian cells

Add to Reading List

Source URL: lowdose.energy.gov

Language: English - Date: 2012-02-28 18:10:27
UPDATE