Public-key cryptography

Results: 11378



#Item
961Verisign / Extended Validation Certificate / Certificate authority / Public key certificate / X.509 / VeriSign Secured Seal / Cryptography / Key management / Public-key cryptography

CASE STUDY AC LENS Gains Ground on the Competition using VeriSign® Extended Validation SSL

Add to Reading List

Source URL: www.certs4less.com

Language: English - Date: 2010-07-14 14:04:54
962Quality / Public-key cryptography / Professional certification / ISO / Det Norske Veritas / Certification / Public key certificate / Standards / Evaluation / Quality management

Strålfors_AB_ISO_9001-2008_Certificate-MSC_1-13M5HRA_CC

Add to Reading List

Source URL: www.stralfors.se

Language: English - Date: 2015-04-14 10:01:24
963Identity document / Public key certificate / Birth certificate / Cryptography / Security / Public-key cryptography

GOVERNMENT OF TAMIL NADU MEDICAL SERVICES RECRUITMENT BOARD 7th Floor, DMS Building, 359, Anna Salai,Teynampet, ChennaiWebsite www.mrb.tn.gov.in e – mail:

Add to Reading List

Source URL: www.mrb.tn.gov.in

Language: English - Date: 2013-09-28 05:16:35
964Digital Transmission Content Protection / Advanced Access Content System / Device Keys / Know-how / Copy protection / Public key certificate / Compliance and Robustness / Cryptography / Intellectual property law / Digital rights management

DIGITAL TRANSMISSION PROTECTION LICENSE AGREEMENT Evaluation License Convertible to Product License This DIGITAL TRANSMISSION PROTECTION LICENSE AGREEMENT, (“Agreement”) is effective as of the latest date set out on

Add to Reading List

Source URL: www.dtcp.com

Language: English - Date: 2012-10-16 11:48:52
965Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2010-11-25 08:58:28
966Public-key cryptography / Categorical data / Electronic commerce / Logistic regression / XTR / Linear regression / RSA / Paillier cryptosystem / Mental poker / Statistics / Regression analysis / Econometrics

2015 IEEE CS Security and Privacy Workshops Privacy-Preserving Statistical Analysis by Exact Logistic Regression David A. duVerle∗† , Shohei Kawasaki‡ , Yoshiji Yamada§ , Jun Sakuma‡¶ and Koji Tsuda∗

Add to Reading List

Source URL: www.genopri.org

Language: English - Date: 2015-05-21 15:25:23
967CEN Workshop Agreement / Electronic signature / Digital signature / Public key certificate / FIPS 140-2 / Cryptography / Key management / Public-key cryptography

www.thales-esecurity.com Protection Profiles for Signing Devices Report on CEN Standardisation Activities on Security of Electronic Signatures

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2011-09-21 17:32:04
968Public-key cryptography / Trademark / Mars /  Incorporated / National Football League / Marketing / Business / Food industry / Electronic commerce / Key management / Public key certificate

MARS CHOCOLATE NORTH AMERICA GET GEAR OFFER You may request a $10 NFLShop.com Gift Certificate (“Certificate”) if you purchase any three (3) packages of the eligible Mars Chocolate products listed below (the “Parti

Add to Reading List

Source URL: snickers.com

Language: English - Date: 2013-09-16 11:16:26
969Cryptography / Identification / Surveillance / Fingerprint recognition / Fingerprint / Public key fingerprint / Secure multi-party computation / Minutiae / Fingerprint Verification Competition / Fingerprints / Biometrics / Security

Poster: Secure Computation of Fingerprint Alignment and Matching Fattaneh Bayatbabolghani and Marina Blanton Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN, USA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:47
970Digital signature / Notary / Electronic signature / United Nations Commission on International Trade Law / Public key certificate / Information security / Cryptography / Key management / Public-key cryptography

Main Legal Issues Concerning Information Security ENISA-FORTH Summer School in Network and Information Security Heraklion, September 2008

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:06
UPDATE