Public key infrastructure

Results: 1492



#Item
341Cryptography / Key management / Public key infrastructure / Public-key cryptography / Pharmaceutical industry / E-commerce / Public key certificate / Email / Authentication / Negotiation / Validation

Authorized Negotiator/Contract Administrator Updates Version 1.0 This document will explain the Authorized Negotiators/Contract Administrators enhancements that will be available in the November 2012 Release.

Add to Reading List

Source URL: eoffer.gsa.gov

Language: English - Date: 2014-04-22 14:22:59
342Cryptography / Transport Layer Security / Public key infrastructure / Key management / Public-key cryptography / Cryptographic protocols / Certificate authority / HTTPS / Public key certificate / X.509 / Root certificate / Extended Validation Certificate

Here’s My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web Devdatta Akhawe Bernhard Amann

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
343Cryptography / Key management / Public key infrastructure / Public-key cryptography / Qualifications / E-commerce / Public key certificate / Academic certificate

Microsoft Word - app_cer_doc 1.doc

Add to Reading List

Source URL: graddiv.ucsc.edu

Language: English - Date: 2014-08-30 22:31:58
344Key management / Public key infrastructure / E-commerce / Certificate authorities / Transport Layer Security / Comodo Group / Extended Validation Certificate / Public key certificate / Comodo / Online shopping / Comodo SSL / CA/Browser Forum

The Benefits of EV SSL Certificates Reduce Shopping Cart Abandonment and Increase Conversion Rates EV SSL Certificates The State of Cyber Security and the Importance of EV SSL Certificates

Add to Reading List

Source URL: ssl.comodo.com

Language: English - Date: 2015-08-10 03:35:58
345Cryptography / Public-key cryptography / Public key infrastructure / Key management / Public key certificate / Permanent account number / Identity document / Certificate authority / Authentication / Key / Smart card

NIC Certifying Authority National Informatics Centre Ministry of Communications & Information Technology Government of India Photo & ID proof to

Add to Reading List

Source URL: nicca.nic.in

Language: English - Date: 2014-06-30 05:31:35
346Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

Add to Reading List

Source URL: esorics2015.sba-research.org

Language: English - Date: 2015-09-22 04:03:47
347Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / Certificate authority / DigiCert / Certificate policy / CyberTrust / Public key certificate / X.509

Microsoft Word - DigiCert_CPS_v408-1-Apr-2015.doc

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2016-03-03 14:10:03
348Cryptography / Key management / E-commerce / Public key infrastructure / Public-key cryptography / Transport Layer Security / GeoTrust / Extended Validation Certificate / Wildcard certificate / Certificate authority / Public key certificate

DATA SHEET GeoTrust® True BusinessID Wildcard Secure multiple host names at minimal cost. Whether it’s your company’s home page or your mail server’s host name, protecting sensitive

Add to Reading List

Source URL: www.geotrust.com

Language: English - Date: 2015-10-07 16:55:43
349Cryptography / Key management / Public-key cryptography / Public key infrastructure / Certificate policy / Public key certificate / Certification Practice Statement / Certificate authority / X.509 / Revocation list / S/MIME / Professional certification

INFN CA Certificate Policy and Certification Practice Statement Version 1.0

Add to Reading List

Source URL: security.fi.infn.it

Language: English - Date: 2011-04-08 05:46:20
350Message authentication codes / Public-key cryptography / Public key infrastructure / RSA / BurrowsAbadiNeedham logic / XTR

Pattern-Matching Spi-Calculus∗ Christian Haack Security of Systems Group Faculty of Science, Radboud University Postbus 9010, 6500 GL Nijmegen, The Netherlands

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:41:03
UPDATE