Public-key cryptography

Results: 11378



#Item
761Cryptography / FIPS 201 / Standards / Smart cards / Computer access control / ISO standards / Ubiquitous computing / ISO/IEC / Authentication / PIV / Cryptographic protocol / Public-key cryptography

ITL Bulletin: Improved Security and Mobility Through Updated Interfaces for PIV Cards (July 2015)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-07-21 08:41:09
762Forest certification / Cryptography / Forestry / Rainforest Alliance / Professional certification / Sustainable forest management / Audit / Public key certificate / Forest Stewardship Council / Organic certification

Microsoft Word - SAN-PCertification Policy.docx

Add to Reading List

Source URL: www.san.ag

Language: English - Date: 2015-08-03 15:38:28
763Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / Cryptographic protocols / Certificate authority / Public key certificate / Certificate policy / X.509 / DigiCert / Revocation list

Microsoft Word - DigiCert_CP_v409.doc

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2016-03-04 15:15:05
764Cryptography / Insurance / Public key certificate / Email / Carnival

Consumer Affairs and Licensing Mayor Martin J. Walsh APPLICATION FOR A ONE-TIME CARNIVAL LICENSE I hereby request a license an entertainment license to operate a carnival at (address) . Carnival will consist of the follo

Add to Reading List

Source URL: www.cityofboston.gov

Language: English - Date: 2016-03-02 10:52:01
765Cryptography / Public-key cryptography / Key management / Internet protocols / Internet Standards / Cryptographic protocols / Named data networking / Authentication / Domain Name System Security Extensions / Key / Unique key / Transport Layer Security

Schematizing Trust in Named Data Networking Yingdi Yu Alexander Afanasyev UCLA

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2015-10-01 13:18:57
766Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Zero-knowledge proof / Cryptographic hash function / Coin flipping / Universal composability / Cryptographic primitive / One-way function / Claw-free permutation / RSA

Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-06-28 21:51:08
767

16th IACR International Conference on Practice and Theory in Public Key Cryptography (PKCFebruary 26 – March 1, 2013 Nara, Japan IMPORTANT DATES (Tentative) Submission

Add to Reading List

Source URL: ohta-lab.jp

Language: English - Date: 2013-03-06 06:12:24
    768Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

    Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:35:37
    769Internet / Computing / Domain name system / Cryptography / Internet protocols / Internet Standards / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / Name server / DNS spoofing / DNS hijacking

    MSc System and Network Engineering Research Project II Discovery method for a DNSSEC validating stub resolver

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2015-08-24 06:37:35
    UPDATE