Strong cryptography

Results: 135



#Item
101Cryptographic protocols / X.509 / Web.config / Password / Subroutine / PKCS / Public-key cryptography / Computer programming / Computing

If you are a .net user experiencing authentication problems using strong authentication and receiving an error that reads something like this:   Message : WSE567: The incoming Username token must contain both a nonce a

Add to Reading List

Source URL: www.statemef.com

Language: English - Date: 2010-01-11 15:10:03
102Password / Cryptography / Munged password

Perfect Passwords Target Audience Key Stage 3 Lesson Aim Pupils will increase their personal security online through recognising and creating strong and memorable passwords.

Add to Reading List

Source URL: www.digizen.org

Language: English - Date: 2010-07-26 08:52:38
103Certificate authorities / Cryptographic protocols / Electronic commerce / Comodo Group / Transport Layer Security / Public key certificate / X.509 / Verisign / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:24
104Thawte / X.509 / Root certificate / Certificate authority / Public key certificate / Code signing / Public key infrastructure / Verisign / Trusted third party / Cryptography / Public-key cryptography / Key management

Thawte Code Signing Certificates ® Deliver Software Securely and Reliably for Less Thawte® Code Signing Certificates offer strong protection and rigorous verification for

Add to Reading List

Source URL: www.thawte.com

Language: English - Date: 2011-01-19 15:39:03
105Computer security / Computing / Passphrase / Gmail / Password strength / Password manager / Security / Cryptography / Password

Secure passwords Creating strong and unique passwords. Passwords (or passphrases) protect your computer and online services such as email, online banking, social networking profiles and internet auction accounts

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2013-02-04 16:25:25
106Random oracle / Digital signature / Standard model / RSA / Cramer–Shoup cryptosystem / Public key certificate / Strong RSA assumption / Advantage / BLS / Cryptography / Public-key cryptography / Group signature

Dual Form Signatures: An Approach for Proving Security from Static Assumptions Michael Gerbush University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-08 16:56:54
107Thawte / X.509 / Root certificate / Certificate authority / Public key certificate / Code signing / Public key infrastructure / Verisign / Trusted third party / Cryptography / Public-key cryptography / Key management

Thawte Code Signing Certificates ® Deliver Software Securely and Reliably for Less Thawte® Code Signing Certificates offer strong protection and rigorous verification for

Add to Reading List

Source URL: www.thawte.com

Language: English - Date: 2011-01-19 15:39:03
108National Security Agency / Encryption / Strong cryptography / Export of cryptography in the United States / 56-bit encryption / Cryptography / Security / National security

Microsoft Word - encryptionpolicy1111.doc

Add to Reading List

Source URL: ieeeusa.org

Language: English - Date: 2011-11-28 12:58:50
109Electronic commerce / Cryptographic protocols / DigiCert / Wikimedia Foundation / Certificate authority / Public key certificate / X.509 / Public key infrastructure / Wikipedia / Cryptography / Public-key cryptography / Key management

CASE STUDY: Wikimedia Foundation partners with DigiCert for strong security and streamlined management

Add to Reading List

Source URL: www.digicert.com

Language: English - Date: 2013-11-04 20:48:00
110National Security Agency / Encryption / Strong cryptography / Export of cryptography in the United States / 56-bit encryption / Cryptography / Security / National security

Microsoft Word - encryptionpolicy1111.doc

Add to Reading List

Source URL: www.ieeeusa.org

Language: English - Date: 2011-11-28 12:58:50
UPDATE