SHA-2

Results: 893



#Item
461Road transport / Transportation planning / Segregated cycle facilities / CTC / SHA-2 / SHA-1 / Sidewalk / Transport / Cryptographic hash functions / Land transport

CTC Allocations for December 2014 Project # Allocation Amount Recipient RTPA/CTC District-County

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-12-11 17:17:55
462SHA-1 / Computing / Cryptographic hash functions / CTC / SHA-2

CTC Financial Vote List 2.5 December 10, 2014 Highway Financial Matters

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-11-26 12:05:35
463Enterprise application integration / Middleware / SEEBURGER / Internet / Managed file transfer / Business-to-business / Data / Internet standards / Computing / AS2

SEEBURGER Earns Q1 2013 Drummond Certification for AS2 Interoperability Also Passes 8 Optional Test Profiles, Including SHA-2 for Government & Energy Industry ATLANTA, GA (July 31, 2013) – Global business integration s

Add to Reading List

Source URL: www.seeburger.com

Language: English - Date: 2013-07-31 10:41:07
464Sha Tin Sewage Treatment Works / Waste management in Hong Kong / Water supply and sanitation in Hong Kong / Sha Tin / Shing Mun River / Hong Kong / Sha Tin District / Ma Liu Shui

Agreement No. CE[removed]DS) Relocation of Sha Tin Sewage Treatment Works to Caverns – Feasibility Study Stage 2 Public Engagement Report

Add to Reading List

Source URL: www.ststwincaverns.hk

Language: English - Date: 2014-03-17 05:51:59
465Error detection and correction / Internet protocols / Secure communication / Hashing / Cryptographic protocols / HMAC / Transport Layer Security / SHA-2 / Cryptographic hash function / Cryptography / Cryptographic software / Computing

Microsoft Word - 1l - Accellion Security Policy_Acc_IGL_2014[removed]Accellion response.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:16:41
466Postcolonialism / Mark P. Leone / Archaeology / Archaeological sub-disciplines / Archaeological theory

AR 727: ARCHAEOLOGY AND COLONIALISM Class meets Tuesdays, 2–5 pm, STO243 Instructor: Prof. Mary Beaudry [removed] Voicemail: [removed]Semester II, 2007–2008 Rm. STO 345C, 675 Comm. Ave. Office Hrs.: M 2–3, TR 11

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:19:18
467Key management / Electronic commerce / SHA-2 / SHA-1 / Public key certificate / Academic certificate / Cryptography / Cryptographic hash functions / Public-key cryptography

TA[removed]Secure Certificate Service SHA-1 Deprecation

Add to Reading List

Source URL: www.dts.ca.gov

Language: English - Date: 2014-11-25 14:16:44
468Public-key cryptography / Digital signature / Key / SHA-2 / Cryptography standards / Book:Cryptography / Cryptography / Cryptographic software / Key management

Microsoft Word - CSG-03_S_english.DOC

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-04 00:39:24
469Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / SHA-2 / HMAC / FIPS 140 / Block cipher / Crypto++ / AES implementations / Cryptography / Cryptography standards / Cryptographic software

QTI Cryptographic Module on Crypto 5 Core FIPS[removed]Security Policy Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-31 08:48:13
470Cryptographic software / FIPS 140-2 / Critical Security Parameter / FIPS 140 / Advanced Encryption Standard / SHA-2 / Microsoft CryptoAPI / Crypto++ / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-29 08:49:50
UPDATE