Public-key cryptography

Results: 11378



#Item
401E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Vital statistics

ST MARY’S CATHOLIC SCHOOL Headteacher: Mr A Celano, BSc (Hons), MEd Windhill Bishop’s Stortford Herts CM23 2NQ

Add to Reading List

Source URL: s5874576.avon.inco-soft.co.uk

Language: English - Date: 2016-02-26 09:03:52
402Cryptography standards / Computer law / Signature / E-commerce / Regulation / EIDAS / Public key certificate / Electronic signature / Authentication / Trust service provider / Draft:Test Qualified digital certificate

European Regulation on Electronic Título de presentación Identification and Trust Services Raúl Rubio Nombre Baker

Add to Reading List

Source URL: www.observatoriotui.com

Language: English
403Public key infrastructure / Microsoft InfoPath / Key management / Public-key cryptography / Visual Studio Tools for Office / SharePoint / Visual Studio Tools for Applications / Microsoft Office / Microsoft Visual Studio / Microsoft / Code signing / Active Directory

Robert L. Bogue MS MVP, MCSE, MCSA:SecurityCoding Options for

Add to Reading List

Source URL: www.thorprojects.com

Language: English - Date: 2015-07-23 13:04:56
404Public-key cryptography / Homeomorphisms / Homomorphic encryption / Cryptography / Institute for Applied Information Processing and Communications / FHE

Cryptography for the Cloud Advisor(s): Christian Rechberger, David Derler Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
405Public-key cryptography / Public key infrastructure / Cryptography / Alice and Bob

toStaticHTML() for Everyone! About DOMPurify, Security in the DOM, and Why We Really Need Both A talk by Dr.-Ing. Mario Heiderich, Cure53 || @0x6D6172696F

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-01 11:31:28
406Public-key cryptography / Notary / Elliptic curve cryptography / Randomness / Finite fields / Radio-frequency identification / Authentication protocol / Physical unclonable function / Authentication / Digital signature / Quantum readout of PUFs / Types of physical unclonable function

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-08-29 03:45:16
407Public-key cryptography / Resource Public Key Infrastructure / Cryptography / Netnod / Computer security / Vulnerability

Inter-­‐domain  rou.ng  security   Stocktaking,  state-­‐of-­‐the  art,  and   future  perspec.ves   IEPG,  IETF  78,  Maastricht,  The  Netherlands  

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2010-07-25 05:37:06
408E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Academic certificate / Illinois Veteran Grant

College of DuPage Veterans Services Student Services Center (SSC), Room3814 FAX

Add to Reading List

Source URL: www.cod.edu

Language: English - Date: 2016-08-10 11:38:01
409Stock market / Corporate law / Legal documents / Public key certificate / Public key infrastructure / Public-key cryptography / Stock certificate / Share / Kengen

To: Image Registrars P.O BoxNAIROBI STATUTORY DECLARATION VERIFYING LOSS OF KENGEN SHARE CERTIFICATE/ INDEMNITY Shares Account No…………………

Add to Reading List

Source URL: www.image.co.ke

Language: English - Date: 2011-05-14 11:08:50
410Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Biometrics / Certificate authority / Man-in-the-middle attack / X.509 / Authentication / Key / Revocation list / Public key certificate

Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-11-05 15:10:51
UPDATE