Security parameter

Results: 155



#Item
141FIPS 140-2 / FIPS 140 / NSA Suite B Cryptography / Internet Key Exchange / Virtual private network / Critical Security Parameter / Security and safety features new to Windows Vista / Microsoft CryptoAPI / Cryptography / Cryptography standards / Zeroisation

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:56:13
142FIPS 140-2 / FIPS 140 / NSA Suite B Cryptography / Internet Key Exchange / Critical Security Parameter / Virtual private network / Security and safety features new to Windows Vista / Cryptography / Cryptography standards / Zeroisation

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:48:14
143Computer network security / FIPS 140 / Zeroisation / Critical Security Parameter / Virtual private network / Internet Key Exchange / Advanced Encryption Standard / Security and safety features new to Windows Vista / Microsoft CryptoAPI / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:57:07
144FIPS 140 / Critical Security Parameter / Hardware-based full disk encryption / Computing / Cyberwarfare / Cryptography standards / Computer security / FIPS 140-2

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-18 14:07:16
145FIPS 140 / Critical Security Parameter / Cyberwarfare / Computing / Cryptography standards / Computer security / Zeroisation

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-25 13:52:18
146Mathematics / Computing / Genetic algorithm / Selection / Parameter / National Institute of Standards and Technology / AS/400 Control Language / G-code / Science / Search algorithms / Cybernetics / Mathematical optimization

Combining Genetic Algorithms & Simulation to Search for Failure Scenarios in System Models Kevin Mills, Chris Dabrowski, Jim Filliben and Sandy Ressler NIST Cloud Security Working Group

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-07-18 10:27:38
147Applied mathematics / Decoy state / Quantum key distribution / ETSI Satellite Digital Radio / Information-theoretic security / Man-in-the-middle attack / European Telecommunications Standards Institute / Security parameter / Cryptographic protocol / Quantum cryptography / Cryptography / Quantum information science

GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); Security Proofs

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-12-09 09:45:52
148Crime prevention / National security / Quantum cryptography / FIPS 140-2 / Quantum key distribution / Critical Security Parameter / Zeroisation / Information security / European Telecommunications Standards Institute / Security / Cryptography / Computer security

GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); QKD Module Security Specification

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-12-08 06:01:13
149Data analysis / Humanitarian aid / Nutrition / Food security / Non-parametric statistics / Variance / Parameter / Food and Agriculture Organization / Estimation theory / Statistics / Statistical inference / Food politics

PDF Document

Add to Reading List

Source URL: www.fao.org

Language: English - Date: 2011-01-07 05:39:02
150Internet protocols / Data / Computer network security / Tunneling protocols / Virtual private networks / IPsec / Internet Key Exchange / NAT traversal / Security Parameter Index / Network architecture / Computing / Cryptographic protocols

IPsec HOWTO Ralf Spenneberg ralf (at) spenneberg.net[removed]Revision History Revision[removed]26 Revised by: RS

Add to Reading List

Source URL: www.ipsec-howto.org

Language: English - Date: 2007-02-26 02:49:22
UPDATE