Security parameter

Results: 155



#Item
121Computing / Critical Security Parameter / Wireless security / FIPS 140-2 / IEEE 802.1X / Advanced Encryption Standard / Kerberos / Dynamic SSL / Computer network security / Cryptography / Computer security

Microsoft Word - Secure Client Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-08-20 01:00:00
122FIPS 140-2 / FIPS 140 / Key-agreement protocol / Password / Critical Security Parameter / Key management / Authentication / Diffie–Hellman key exchange / Whitfield Diffie / Cryptography / Cryptographic protocols / Cryptography standards

SNAPfone Security Policy Document Version 1.8 Snapshield, Ltd.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
123Critical Security Parameter / FIPS 140-2 / Key management / FIPS 140 / Cryptographic hash function / Key Wrap / Zeroisation / HMAC / Public-key cryptography / Cryptography / Cryptography standards / PKCS

C4CS Security Policy Security Policy for Version 1.2.2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-08-21 01:00:00
124Critical Security Parameter / Parallel ATA / Computing / Advanced Encryption Standard / FIPS 140 / Cryptography / Smart card / Ubiquitous computing

SecureD v.1.6 Security Policy Document Number: SecureD Security Policy – 100502DS – 01.70 Information Grade: Non-Proprietary Effective Date: [removed]Updated: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
125Advanced Encryption Standard / FIPS 140-2 / Radio Network Controller / FIPS 140 / Symmetric-key algorithm / Critical Security Parameter / Key / Zeroisation / Cryptography / Cryptography standards / Key management

Department Management Plan (DMP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-11-06 00:00:00
126Cryptographic software / Smart card / Key management / Challenge-response authentication / Public-key cryptography / Critical Security Parameter / Hardware security module / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140

Algorithmic Research PrivateServer FIPS[removed]Non-Proprietary Security Policy Level 3 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
127Computing / Information / Tunneling protocols / Computer network security / IPsec / Internet Security Association and Key Management Protocol / Internet security / Password / Security Parameter Index / Cryptographic protocols / Internet protocols / Data

RedCreek Personal Ravlin Cryptographic Module Security Policy for the Federal Information Processing Standards Publication (FIPS Pub[removed]Introduction 1.1 Purpose This Cryptographic Module Security Policy is for th

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
128Critical Security Parameter / Zeroisation / FIPS 140 / Initialization vector / Key / Cryptography / Key management / FIPS 140-2

KVL 3000 Security Policy L AND M OBILE P RODUCTS S ECTOR Radio Network Solutions Group Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
129Computer security / FIPS 140 / Password / Kerberos / Critical Security Parameter / Access control / PKCS / Security and safety features new to Windows Vista / Microsoft CryptoAPI / Cryptography standards / Cryptography / Security

Microsoft Word - Tropos Control Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-02 00:00:00
130FIPS 140 / PKCS11 / PKCS / Cryptographic Module Validation Program / Critical Security Parameter / HMAC / Cryptographic hash function / SHA-2 / Advanced Encryption Standard / Cryptography / Cryptography standards / FIPS 140-2

Entrust Admin User Groups Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE