Public key infrastructure

Results: 1492



#Item
851Public key certificate / X.509 / Revocation list / Public key infrastructure / Certificate authority / Certificate policy / Transport Layer Security / S/MIME / Certificate server / Cryptography / Public-key cryptography / Key management

Post.Trust Certificate Authority

Add to Reading List

Source URL: www.post.trust.ie

Language: English - Date: 2014-05-29 00:01:24
852Certificate policy / Revocation list / Public key certificate / X.509 / Certificate authority / Root certificate / Public key infrastructure / Adobe Systems / GlobalSign / Cryptography / Key management / Public-key cryptography

Certification Practice Statement

Add to Reading List

Source URL: www.post.trust.ie

Language: English - Date: 2014-06-06 00:00:57
853European Grid Infrastructure / Character sets / Rijndael S-box / PGP word list / Cryptography / Public-key cryptography / X.509

Enabling Grids for E-sciencE Grid Certificates and Security Yiannis Ioannou

Add to Reading List

Source URL: linc.ucy.ac.cy

Language: English - Date: 2007-06-05 03:20:59
854Cryptographic protocols / Internet protocols / Internet standards / X.509 / Certificate server / Public key infrastructure / Self-signed certificate / Online Certificate Status Protocol / Revocation list / Cryptography / Public-key cryptography / Key management

Configuring Certificate Enrollment for a PKI This module describes the different methods available for certificate enrollment and how to set up each method for a participating PKI peer. Certificate enrollment, which is t

Add to Reading List

Source URL: www.cisco.com

Language: English
855Key management / Public key infrastructure / Computer security / Smart card / Cyberwarfare / Identity management / Security / Security token / Public-key cryptography / Ubiquitous computing / ISO standards

charismathics_Claim_may2008 neu

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2012-12-15 20:53:50
856Elliptic curve cryptography / Cryptographic protocols / Key size / Diffie–Hellman key exchange / Elliptic curve / Elliptic Curve DSA / Whitfield Diffie / ECC patents / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Public-key cryptography

A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography David J. Malan, Matt Welsh, Michael D. Smith Division of Engineering and Applied Sciences Harvard University {malan,mdw,smit

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2004-08-24 12:30:22
857Construction / Development / Infrastructure / Metropolitan Transit Authority of Harris County / Public transport / Connecticut / Technology / Transport / Transportation planning / Sustainable transport

Microsoft PowerPoint - Summary Lists of Key Points & Recommendations in Reference Documents

Add to Reading List

Source URL: www.ct.gov

Language: English - Date: 2009-04-14 08:44:52
858Revocation list / Public key infrastructure / Online Certificate Status Protocol / Certificate server / PKCS / Self-signed certificate / Public key certificate / Cisco IOS / Cisco Systems / Cryptography / Public-key cryptography / Key management

Public Key Infrastructure Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR[removed]Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

Add to Reading List

Source URL: www.cisco.com

Language: English
859Revocation list / Entrust / Online Certificate Status Protocol / Certificate policy / Public key infrastructure / Public key certificate / X.509 / Certificate server / Cryptography / Public-key cryptography / Key management

shutterstock_70571425 [Converted].eps

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2014-04-23 15:19:14
860Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
UPDATE