Public-key cryptography

Results: 11378



#Item
871Key management / Electronic documents / Notary public / Electronic signature / Digital signature / Electronic commerce / Public key certificate / Identity document / Certificate authority / Cryptography / Notary / Public-key cryptography

XXIV International Congress of the International Union of Latin Notaries Mexico CityTopic II:

Add to Reading List

Source URL: www.bnotk.de

Language: English - Date: 2010-04-06 03:44:43
872Public-key cryptography / Electronic commerce / Notary / Electronic signature / Public key certificate / Information security / Digital signature / Authentication / Electronic business / Cryptography / Security / Key management

DOC Document

Add to Reading List

Source URL: www.mg.gov.pl

Language: English - Date: 2014-07-24 09:08:33
873TCP/IP / Electronic commerce / Key management / Tcpcrypt / Transmission Control Protocol / Public key certificate / Transport Layer Security / Cryptography / Public-key cryptography / Cryptographic protocols

Introduction tcpcrypt Performance Conclusion 1/25

Add to Reading List

Source URL: www.tcpcrypt.org

Language: English - Date: 2010-08-13 12:07:58
874USB / Aloaha / Non-volatile memory / Cryptographic software / Password / Portable Document Format / Public-key cryptography / S/MIME / Electronic business / Computing / Cryptography / Disk encryption

Aloaha PDF Crypter Digital Rights Management for PDF Documents

Add to Reading List

Source URL: www.aloaha.com

Language: English
875RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
876Windows / Encrypting File System / Software / Public-key cryptography / Cryptography / Cryptographic software / Cloud computing / Computing

1 POSTER: W E S HARE: A Coercion-Resistant and Scalable Storage Cloud Hoon Wei Lim, Loi Luu, Shruti Tople, Prateek Saxena School of Computing, National University of Singapore {hoonwei,loiluu,shruti90,prateeks}@comp.nus

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-16 03:07:38
877PKCS / Key / Cryptography / Public-key cryptography / Key management

Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices∗ V´eronique Cortier Graham Steel

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:12
878Evaluation / Public-key cryptography / Electronic signature / FIPS 140-2 / Digital signature / Common Criteria / Protection Profile / Cryptography / Computer security / CEN Workshop Agreement

Microsoft Word - CWA14167-4_without_backup_CMCSO-PP_v028.doc

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:21:33
879Electronic commerce / Integer factorization algorithms / RSA / Prime number / Modular arithmetic / Coprime / Euclidean algorithm / Greatest common divisor / Cryptography / Mathematics / Public-key cryptography

Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2011-03-23 04:16:10
880Identity document / Birth certificate / Public key certificate / Anna Salai / Cryptography / Security / Public-key cryptography

GOVERNMENT OF TAMIL NADU MEDICAL SERVICES RECRUITMENT BOARD 7th Floor, DMS Building, 359, Anna Salai,Teynampet, ChennaiWebsite www.mrb.tn.gov.in e – mail:

Add to Reading List

Source URL: www.mrb.tn.gov.in

Language: English - Date: 2013-12-18 00:43:17
UPDATE