SHA-2

Results: 893



#Item
591X.509 / Revocation list / Public key certificate / Certificate policy / Digital signature / SHA-2 / Cryptography / Public-key cryptography / Key management

Agency Best Practices for Device Certificates

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2007-03-19 13:40:24
592Sha Zukang / School of International and Public Affairs /  Columbia University / Moscow State Institute of International Relations / Under-Secretary-General of the United Nations / Rima Khalaf / United Nations / Irina Bokova / Asha-Rose Migiro

Microsoft Word[removed]Economic and Social Council High-level Segment - Speaker Biography Compilation_2 July.doc

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2011-07-07 15:15:43
593Politics / Population / United Nations Department of Economic and Social Affairs / Inter-Parliamentary Union / Sha Zukang / Ministry of Foreign Affairs / Foreign minister / United Nations / Government / United Nations Secretariat

UNDESA/OESC 28 June 2010 Economic and Social Council 2010 High-level Segment New York, 28 June-2 July

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2010-07-08 15:08:40
594Digital libraries / Library science / Preservation / Museology / Hashing / Digital preservation / Checksum / BagIt / SHA-2 / Error detection and correction / Archival science / Cryptographic hash functions

Draft Fact Sheet NDSA Infrastructure &Standards Working Groups Checking Your Digital Content: How, What and When to Check Fixity? How do I know what I have and the file/object is not corrupted, changed or altered?

Add to Reading List

Source URL: blogs.loc.gov

Language: English - Date: 2014-02-05 15:41:04
595FIPS 140-2 / SHA-2 / RSA / X.509 / Index of cryptography articles / Network Security Services / Cryptography / Public-key cryptography / Digital signature

Microsoft PowerPoint - Pres-Burr-CryptographySection.ppt

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 13:09:17
596Telephony / CLLI code / Geocodes

Central Office Code Assignment Guidelines (COCAG) Central Office Code (NXX) Assignment Request - Part 2, Form 8 - ATIS[removed]p2f8 May 25, 2012 Following are Switch Homing Arrangement (SHA) data requirements for the Tel

Add to Reading List

Source URL: www.cnac.ca

Language: English - Date: 2014-05-13 07:34:43
597Business law / Corporate governance / Board of directors / Committees / Management / Annual general meeting / Proxy voting / Corporations law / Business / Private law

Proxy solicited by the directors and management of the company for the annual meeting of shareholders, May 2, 2006 Imperial Oil Limited, 237 Fourth Avenue South West, Calgary, Alberta, Canada T2P 3M9 The undersigned sha

Add to Reading List

Source URL: www.imperialoil.ca

Language: English - Date: 2012-10-06 23:29:17
598Nicholas Honerkamp / Christopher C. Fennell / Year of birth missing / Archaeology

2008 Historical Archaeology VOLUME 43, NUMBER 2 Historical Archaeology

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:16:56
599Hashing / NIST hash function competition / MD5 / Hash function / HMAC / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Competition - Round 2: Official Comments-BMW

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:12:20
600Excavation / Historical archaeology / Museology / Academia / Science / Archaeological sub-disciplines / Anthropology / Archaeology

University of Louisville Anthropology[removed], Urban and Historic Archaeology Fall 2004-M and W 2:00pm to 3:15pm Rm. 232 Lutz Hall Instructor: M. Jay Stottman Office: R244 Lutz Hall

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2014-02-03 15:20:26
UPDATE