Public-key cryptography

Results: 11378



#Item
291Cryptography / Equity / Common law / Law / Inheritance / Trust law / Cestui que / Fiduciary / Trustor / Public key certificate

Settlement of Mine and My Trust’s Public Debt September 21, 2009 From: Your : Name

Add to Reading List

Source URL: freedom-school.com

Language: English - Date: 2015-05-02 12:23:29
292Cryptography / International Electrotechnical Commission / Standards organizations / Kitemark / Product safety / BSI Group / Management system / Public key certificate / Quality management

Certificate of Registration QUALITY MANAGEMENT SYSTEM - ISO 9001:2008 This is to certify that: Power Design Manufacturing 121 East Brokaw Road

Add to Reading List

Source URL: www.powerdesignservices.com

Language: English - Date: 2016-06-23 20:32:59
293Cryptography / Cayman Islands / Public key certificate / Land Registry

FORM R.L.8 INSTRUMENT NO.

Add to Reading List

Source URL: www.caymanlandinfo.ky

Language: English - Date: 2010-01-27 13:17:52
294Cryptography / Public-key cryptography / Signcryption / Cryptographic primitive / Ciphertext indistinguishability / Key

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
295Cryptography / Cer / Orion / Arvada /  Colorado / Public key certificate

Certificate of Certification Orion Registrar, Inc. This is to cer fy the Quality Management System of: AxXis Corpora on 1535 Nandina Avenue

Add to Reading List

Source URL: axxiscorp.us

Language: English - Date: 2016-06-03 17:38:32
296Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:06:48
297Internet / Computing / Cryptography / Internet Standards / Internet protocols / Domain name system / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / DNS spoofing / NSD / Comparison of DNS server software

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:03
298Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
299Biometrics / Cryptography / Security / Access control / Identification / Fingerprints / Fingerprinting algorithms / Fingerprint recognition / Surveillance / Fingerprint / Public key fingerprint / Privacy

Preprint of paper for WIFS2010. 1 INTRODUCTION

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2011-02-20 12:09:41
300Computing / Cryptography / Smart cards / ISO standards / Technology / Cryptography standards / Public-key cryptography / Ubiquitous computing / Web API / Application programming interface / ISO/IEC / Near field communication

Open Mobile API Specification V3.2 Copyright © 2016 SIMalliance Ltd. The information contained in this document may be used, disclosed and reproduced without the prior written authorization of SIMalliance. Readers are a

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2016-02-11 04:02:05
UPDATE