Public key infrastructure

Results: 1492



#Item
51Cryptography / Key management / Public-key cryptography / Public key infrastructure / DiffieHellman key exchange / Key-agreement protocol / Information-theoretic security / IEEE 802.11 / RSA / Key generation / Key distribution / Secure channel

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-08-05 21:36:39
52Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Root certificate / Public key certificate / Certificate authority / Intermediate Certificate Authority / Chain of trust

ALOHA LOAD BALANCER MANAGING SSL – CHAINED CERTIFICATES “APPNOTE” #0024 ― MANAGING SSL — CHAINED CERTIFICATES This application note is intended to help you implement SSL management via chained certificates with

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:52:21
53Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Public key certificate / Certificate authority / X.509 / Revocation list / Energy Sciences Network / Root certificate

DOE Science Grid PKI Certificate Policy And Certification Practice Statement

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-02-19 17:44:10
54Cryptography / Public-key cryptography / Key management / Public key infrastructure / Certificate policy / Public key certificate / Certificate authority / Authentication / Revocation list / X.509 / Certification Practice Statement / Electronic authentication

Digitally signed by JOHN VOLMER (Affiliate) DN: c=US, o=U.S. Government, ou=Department of Energy, =, cn=JOHN VOLMER (Affiliate)

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2009-08-10 19:47:56
55Cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / DV / Order / Inspection / Professional certification

Citizen’s Charter No. 15-a Name of Agencies Frontline Service Schedule of Availability of Service Who May Avail of the Service

Add to Reading List

Source URL: www.denr.gov.ph

Language: English - Date: 2016-07-07 05:12:13
56Cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Application for employment

Bhutan Power Corporation Limited Thimphu : Bhutan BPC JOB APPLICATION FORM Post Applied For: Name: (In Block Letters)

Add to Reading List

Source URL: www.bpc.bt

Language: English - Date: 2013-06-24 04:36:54
57Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 09:29:08
58Cryptography / Education / Product certification / Standards / Key management / Public key infrastructure / Public-key cryptography / Professional certification / Public key certificate / Academic certificate / SGS

Certificate CH15The management System of Infomaniak Network SA Avenue de la Praille 26,

Add to Reading List

Source URL: www.infomaniak.fr

Language: English - Date: 2016-02-05 06:51:36
59Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
60Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
UPDATE