Public-key cryptography

Results: 11378



#Item
421Graph theory / Cryptography / Dining cryptographers problem / Vertex / Public-key cryptography / Graph / Connected component / Data Encryption Standard

J. Cryptology:Journal of CryptologyInternational Association for Cryptologic Research

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:04:47
422Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / Public key certificate / Certificate authority / CA/Browser Forum / Certificate policy / Online Certificate Status Protocol / Revocation list / Certification Practice Statement

Microsoft Word - CA-Browser Forum BRredlined.doc

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2016-07-11 12:17:57
423Public-key cryptography / Hypertext Transfer Protocol / Computer network security / Public key infrastructure / Internet privacy / HTTP cookie / Email / Computer security

Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Dalhousie University Halifax, NS, Canada {whalen, inkpen}@cs.dal.ca Introduction and Overview

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English
424Transport Layer Security / Public-key cryptography / Key management / Public key infrastructure / Cryptographic protocols / Online Certificate Status Protocol / Revocation list / Certificate authority / X.509 / OCSP stapling / Revocation / Key

2016 IEEE European Symposium on Security and Privacy PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem Pawel Szalachowski, Laurent Chuat, and Adrian Perrig Department of Computer

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-04-19 10:06:03
425Computer access control / E-commerce / Certificate authorities / Public-key cryptography / Federated identity / Authentication / Digital identity / Entrust / Public key certificate / IdenTrust / Peer-to-peer / Identity management

Identity Authentication: Increasing Confidence in Peer-to-Peer Networks IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
426E-commerce / Crime prevention / Cryptography / Information governance / National security / LegalShield / Computer security / Jeff Bell / Public key certificate / Cloud computing / Application server

SOC 3 for Security, Availability, Processing Integrity, and Confidentiality Independent Practioner’s Trust Services Report For the Period January 1, 2015 through December 31, 2015 Independent SOC 3 Report for the Secu

Add to Reading List

Source URL: www.legalshield.com

Language: English - Date: 2016-04-08 14:26:23
427Key management / Public-key cryptography / Computer access control / Public key infrastructure / Certificate authorities / Authentication / Public key certificate / IdenTrust

IdenTrust™ Trust Counsel Smarter and Faster Trust Deployment The IdenTrust™ Trust Counsel service provide corporations, governments, and financial institutions with the expertise and implementation assistance require

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
428Public-key cryptography / Cryptography / Key management / Blind signature / Electronic voting / Financial cryptography / Digital signature / Blinding / RSA / Key / Cryptographic protocol / One-time pad

United States Patent] Chaum

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:14
429Finite fields / Elliptic curve cryptography / Public-key cryptography / Alfred Menezes / Cryptography / Elliptic curve / CINVESTAV

Francisco Rodr´ıguez-Henr´ıquez Associate Professor CINVESTAV 3-C CINVESTAV-IPN Av. Instituto Polit´ecnico Nacional No. 2508, 07360, M´exico City, M´exico Tel: (3800 Ext. 6570

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2015-03-12 01:14:57
430Cloud storage / Cloud computing / Cloud infrastructure / Data security / Attribute-based encryption / Public-key cryptography / Encryption / Key management / Cloud computing security / HP Cloud

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 07:38:35
UPDATE