Public infrastructure

Results: 10629



#Item
271Transport Layer Security / Public-key cryptography / Key management / Public key infrastructure / Cryptographic protocols / Online Certificate Status Protocol / Revocation list / Certificate authority / X.509 / OCSP stapling / Revocation / Key

2016 IEEE European Symposium on Security and Privacy PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem Pawel Szalachowski, Laurent Chuat, and Adrian Perrig Department of Computer

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-04-19 10:06:03
272National Rifle Association / National Roads Authority / Infrastructure / Road / Development Policy Centre

ISSUES PAPER October 2015 Matthew Dornan Crawford School of Public Policy, The Australian National University.  

Add to Reading List

Source URL: www.nri.org.pg

Language: English - Date: 2015-10-14 02:38:02
273Key management / Public-key cryptography / Computer access control / Public key infrastructure / Certificate authorities / Authentication / Public key certificate / IdenTrust

IdenTrust™ Trust Counsel Smarter and Faster Trust Deployment The IdenTrust™ Trust Counsel service provide corporations, governments, and financial institutions with the expertise and implementation assistance require

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
274Environmentalism / Sustainability / Sustainable forest management / Protected area / The LIFE Programme / Ministry of Environment

Partner Search - Priority Axis 1: Promotion of the environment, sustainable transport and public infrastructure Organisation Agricultural Department Technology of the

Add to Reading List

Source URL: www.greece-albania.eu

Language: English - Date: 2016-07-11 03:47:41
275Cloud storage / Cloud computing / Cloud infrastructure / Data security / Attribute-based encryption / Public-key cryptography / Encryption / Key management / Cloud computing security / HP Cloud

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 07:38:35
276Public-key cryptography / Identity management / Public key infrastructure / Key management / Cryptography / Privacy-enhancing technologies / Pseudonymity / Authentication / Blacklist / User / Internet privacy / Anonymity

Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
277Berkshire Hathaway / Energy in Oregon / PacifiCorp / Electrical grid / National Grid / Arizona Public Service / Federal Energy Regulatory Commission

TransWest Express and Gateway S Co-developed by four leading entities: Arizona Public Service PacifiCorp National Grid Wyoming Infrastructure Authority

Add to Reading List

Source URL: www.transwestexpress.net

Language: English - Date: 2013-06-12 03:06:18
278Regional Internet registries / Routing protocols / Public-key cryptography / Resource Public Key Infrastructure / NLnet / Internet Standards / Border Gateway Protocol / Asia-Pacific Network Information Centre / AFRINIC / Internet / IPv6 / American Registry for Internet Numbers

Internet  Rou*ng  Security:   What’s  Next?   Benno  Overeinder   NLnet  Labs   http://www.nlnetlabs.nl/

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-01-18 09:16:13
279E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography

BJMP RECRUITMENT PROCESS Proceed to the Directorate for Personnel & Records Management (DPRM)/Personnel & Records Management Division (PRMD) and submit to the authorized personnel the following documents placed in a fol

Add to Reading List

Source URL: www.bjmp.gov.ph

Language: English - Date: 2016-01-13 23:20:12
280Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Cryptographic protocols / Certificate authority / Form / Public key certificate / HTTPS / Email

Thank you for choosing IdenTrust as your ECA Certificate vendor! These instructions are for ECA Medium Hardware certificates **NOTE** Most programs allow the Medium Token certificate be used as well as the Medium Hardwar

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:55:28
UPDATE