Public key infrastructure

Results: 1492



#Item
411Key management / Computer security / Digital signature / Electronic signature / Non-repudiation / X.509 / Public key infrastructure / Signature / Public key certificate / Cryptography / Public-key cryptography / Notary

PDF Document

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:01:38
412Access control / Identity management / Computer security / Simple public key infrastructure / PERMIS / Authentication / Filesystem permissions / KB / Public key certificate / Cryptography / Key management / Public-key cryptography

Authorisation Subterfuge by Delegation in Decentralised Networks Simon Foley and Hongbin Zhou Department of Computer Science, University College, Cork, Ireland. ,

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-06-02 09:03:03
413Information Technology Infrastructure Library / Environment / Government / Public–private partnership / Environmental planning / Construction / Development / Infrastructure

The opportunity Chapter 11 Key themes and opportunities PageKey themes and opportunities 11.1 The infrastructure imperative: value for money investment in productive infrastructure

Add to Reading List

Source URL: insw.com

Language: English - Date: 2014-11-30 22:38:15
414Certificate authority / Peer-to-peer / Revocation list / Man-in-the-middle attack / Public key certificate / Public key infrastructure / Trusted Computing Group / Trusted Computing / Trusted Execution Technology / Cryptography / Public-key cryptography / Key management

Int. J. Inf. SecurDOIs10207x S P E C I A L I S S U E PA P E R Gabriel Vanrenen · Sean Smith · John Marchesini

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:23:27
415Cryptographic protocols / Digital signature / Paperless office / Public key infrastructure / Electronic signature / X.509 / Legal instrument / Signature / Cryptography / Public-key cryptography / Key management

Brochure_VMESign_New2adjusted

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:01:38
416Cryptographic protocols / Public-key cryptography / Key management / PKI Resource Query Protocol / Online Certificate Status Protocol / SCVP / Public key infrastructure / Dynamic Host Configuration Protocol / X.509 / Cryptography / Internet protocols / Internet standards

AutoPKI: a PKI Resources Discovery System? Massimiliano Pala and Sean W. Smith Dartmouth College, Computer Science Department, 6211 Sudikoff, Hanover, NH 03755, US {pala,sws}@cs.dartmouth.edu http://www.cs.dartmouth.edu

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-04-29 13:13:22
417Electronic commerce / Public-key cryptography / Borders of the United States / Electronic data interchange / Information / Public key infrastructure / Australian Customs and Border Protection Service / U.S. Customs and Border Protection / National security / Customs services / Computing / Key management

Microsoft Word - ACCA2011_10.doc

Add to Reading List

Source URL: cargosupport.gov.au

Language: English - Date: 2011-09-12 21:41:47
418Internet / Email privacy / Gmail / Web bug / Webmail / Steganography / Anonymous remailer / Message transfer agent / Public-key cryptography / Email / Computer-mediated communication / Computing

Privacy Preserving Web-Based Email Kevin Butler, William Enck, Jennifer Plasterr, Patrick Traynor, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory The Pennsylvania State University University

Add to Reading List

Source URL: www.enck.org

Language: English
419Certificate policy / Public key certificate / Revocation list / Certificate authority / Root certificate / Hongkong Post / CERT Group of Companies / Academic certificate / Public key infrastructure / Cryptography / Key management / Public-key cryptography

THE CERTIFICATION PRACTICE STATEMENT OF THE POSTMASTER GENERAL As A Recognized Certification Authority under the Electronic Transactions Ordinance

Add to Reading List

Source URL: www.hongkongpost.gov.hk.

Language: English - Date: 2015-03-31 06:40:30
420Cryptographic software / Public-key cryptography / Hushmail / Webmail / Comodo Group / Phishing / Comodo / Public key infrastructure / Public key certificate / Cryptography / Internet privacy / Key management

Brand Protection Trademark Protection Digital Brand Verification Solutions from Comodo

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2014-02-03 11:07:19
UPDATE