Public-key cryptography

Results: 11378



#Item
801Cryptography / Key management / Public key infrastructure / Public-key cryptography / Pharmaceutical industry / E-commerce / Public key certificate / Email / Authentication / Negotiation / Validation

Authorized Negotiator/Contract Administrator Updates Version 1.0 This document will explain the Authorized Negotiators/Contract Administrators enhancements that will be available in the November 2012 Release.

Add to Reading List

Source URL: eoffer.gsa.gov

Language: English - Date: 2014-04-22 14:22:59
802Cryptography / Gilead Sciences / Business / Specialty drugs / Adefovir / Gilead / Public key certificate

Microsoft Word - GOCERdoc

Add to Reading List

Source URL: www.gilead.com

Language: English - Date: 2013-02-24 19:40:16
803Cryptography / Transport Layer Security / Public key infrastructure / Key management / Public-key cryptography / Cryptographic protocols / Certificate authority / HTTPS / Public key certificate / X.509 / Root certificate / Extended Validation Certificate

Here’s My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web Devdatta Akhawe Bernhard Amann

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
804Cryptography / Key management / Public key infrastructure / Public-key cryptography / Qualifications / E-commerce / Public key certificate / Academic certificate

Microsoft Word - app_cer_doc 1.doc

Add to Reading List

Source URL: graddiv.ucsc.edu

Language: English - Date: 2014-08-30 22:31:58
805Cryptography / E-commerce / Email / Public key certificate / Identity document

THE LAND REGISTRY E-ALERT SERVICE - APPLICATION FOR CHANGE OF PARTICULARS Particulars of Subscriber’s Account

Add to Reading List

Source URL: www.landreg.gov.hk

Language: English - Date: 2015-07-14 05:28:36
806Cryptography / Insurance / Parking / Public key certificate / Bren light machine gun

  UNIVERSITY  OF  CALIFORNIA,  IRVINE   Dance  Crew  Practice  Locations  2014     Below  are  legitimate  practice  locations  for  dance  crews  at  UC  Ir

Add to Reading List

Source URL: campusorgs.uci.edu

Language: English - Date: 2015-03-19 12:59:40
807Cryptography / Spamming / Key management / Public-key cryptography / Computer security / Spam filtering / Password / Whitelist / Persona / Key / Email client / Phishing

The Strengths of Weaker Identities: Opportunistic Personas∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:02
808Cryptography / Public-key cryptography / Public key infrastructure / Key management / Public key certificate / Permanent account number / Identity document / Certificate authority / Authentication / Key / Smart card

NIC Certifying Authority National Informatics Centre Ministry of Communications & Information Technology Government of India Photo & ID proof to

Add to Reading List

Source URL: nicca.nic.in

Language: English - Date: 2014-06-30 05:31:35
809Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

Add to Reading List

Source URL: esorics2015.sba-research.org

Language: English - Date: 2015-09-22 04:03:47
810Cryptography / Cloud computing / Key management / Public-key cryptography / Cloud computing security / Computer security / Encryption / Symmetric-key algorithm / Key / Disk encryption / Database encryption

Microsoft PowerPoint - Copy of slides.ppt

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:33:14
UPDATE