Public key infrastructure

Results: 1492



#Item
501Simple public key infrastructure / Access control / Logic in computer science / Programming language semantics / Access Control Matrix / Kernel / Architecture of Windows NT / Operational semantics / Logical access control / Security / Computer security / Key management

Reconstructing Trust Management Ajay Chander ∗ Drew Dean † John C. Mitchell∗

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-02-04 00:01:29
502Public key certificate / Revocation list / Public key infrastructure / Certificate authority / Identity document / Certificate policy / X.509 / Cryptography / Public-key cryptography / Key management

k Certification policy – personal certificate Public key infrastructure (PKI) in Komerční banka

Add to Reading List

Source URL: www.mojebanka.cz

Language: English - Date: 2011-01-07 05:36:21
503Access control / Key management / Simple public key infrastructure / Authentication / PERMIS / Authorization / Credential / Lightweight Directory Access Protocol / Trust management / Security / Identity management / Computer security

A research and education initiative at the MIT Sloan School of Management Delegation Logic: A Logic-based Approach to Distributed Authorization Paper 115

Add to Reading List

Source URL: ebusiness.mit.edu

Language: English - Date: 2012-11-08 09:59:25
504Revocation list / Public key certificate / Root certificate / Certificate authority / Public key infrastructure / Certificate policy / X.509 / Cryptography / Public-key cryptography / Key management

k Root certification authority cetification policy Public key infrastructure (PKI)

Add to Reading List

Source URL: www.mojebanka.cz

Language: English - Date: 2011-01-07 05:36:22
505Public key certificate / Revocation list / Public key infrastructure / Certificate authority / Identity document / Certificate policy / Extended Validation Certificate / Cryptography / Public-key cryptography / Key management

k Certification policy – company certificate Public key infrastructure (PKI) in Komerční banka

Add to Reading List

Source URL: www.mojebanka.cz

Language: English - Date: 2011-01-07 05:09:39
506X.509 / Certificate authority / Extended Validation Certificate / Public key certificate / Public key infrastructure / Computational trust / HTTP Secure / Phishing / Self-signed certificate / Cryptography / Key management / Public-key cryptography

Trust Views for the Web PKI Johannes Braun, Florian Volk, Johannes Buchmann and Max M¨ uhlh¨auser Technische Universit¨ at Darmstadt/CASED Hochschulstraße 10, 64283 Darmstadt, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-12 06:36:08
507Key management / Zero-knowledge proof / Secure multi-party computation / Standard model / Secure two-party computation / Alice and Bob / IP / Trusted third party / Public key infrastructure / Cryptography / Cryptographic protocols / Public-key cryptography

Calling out Cheaters: Covert Security With Public Verifiability∗ Gilad Asharov Claudio Orlandi†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 09:16:36
508Certificate authority / Man-in-the-middle attack / Digital signature / Alice and Bob / Public key infrastructure / Public key certificate / RSA / Cryptography / Public-key cryptography / Key management

KEY DISTRIBUTION 1/1 The public key setting

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-06-02 11:33:43
509Regional Internet Registries / Routing protocols / Internet protocols / Internet standards / Public-key cryptography / NLnet / Border Gateway Protocol / Resource Public Key Infrastructure / Asia-Pacific Network Information Centre / Internet / Network architecture / Computing

Internet  Rou*ng  Security:   What’s  Next?   Benno  Overeinder   NLnet  Labs   http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2011-01-18 09:16:13
510Computer security / Cyberwarfare / Identity management / Electronic commerce / Identity / HID Global / Entrust / Public key infrastructure / Assa Abloy / Key management / Public-key cryptography / Security

Microsoft Word - PIV-I - Draft 7.docx

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2015-04-21 14:25:30
UPDATE