Trusted third party

Results: 64



#Item
41Thawte / X.509 / Root certificate / Certificate authority / Public key certificate / Code signing / Public key infrastructure / Verisign / Trusted third party / Cryptography / Public-key cryptography / Key management

Thawte Code Signing Certificates ® Deliver Software Securely and Reliably for Less Thawte® Code Signing Certificates offer strong protection and rigorous verification for

Add to Reading List

Source URL: www.thawte.fr

Language: English - Date: 2011-01-21 12:37:26
42Data security / Computer network security / Crime prevention / National security / Key escrow / Public-key cryptography / Backup / Computer security / Plaintext / Cryptography / Security / Key management

RISKS THE OF KEY RECOVERY,KEYESCROW, TRUSTED THIRD PARTY

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2001-01-02 13:41:20
43Cryptographic protocols / Copyright law / Trusted Computing / Public key certificate / Revocation list / Certificate authority / Trusted Platform Module / Public key infrastructure / Trusted third party / Cryptography / Public-key cryptography / Key management

Offline Count-Limited Certificates ∗ Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory (CSAIL)

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2007-10-30 23:47:52
44Revocation list / Drug Enforcement Administration / Public key certificate / X.509 / Certificate policy / Controlled Substances Act / Public key infrastructure / Certificate authority / Trusted third party / Cryptography / Public-key cryptography / Key management

Controlled Substances Ordering System Under the authority of the Controlled Substances Act of 1970, the Drug Enforcement Administration (DEA), Office of Diversion Control (OD) regulates the manufacture and distribution o

Add to Reading List

Source URL: www.deaecom.gov

Language: English - Date: 2010-07-20 15:26:04
45Employment / Business-education partnerships / Economic development / Workforce development / Business

What’s Working in Colorado Lessons Learned from Sector Partnerships Select a Convener that is trusted by Business Successful sector partnerships have at their core a trusted third party that has credibility with indust

Add to Reading List

Source URL: dllr.maryland.gov

Language: English - Date: 2013-10-01 07:37:53
46Third-party administrator / Deductible / Business / Insurance / Markel / Self insurance / Employee benefit / Health economics / Financial economics / Economics

Texas Non-Subscriber markelprograms.com When Midlands Management needed a home for their Texas Non-Subscriber business, it only made sense to look to a long-term, trusted partner. Markel and Midlands have been business p

Add to Reading List

Source URL: www.markelinsurance.com

Language: English - Date: 2014-10-22 21:52:15
47Technology / Logistics / Third-party logistics / Supply chain / Materials management / Council of Supply Chain Management Professionals / Management / Supply chain management / Business

Market Coverage Make the most out of your media partnership MM&D serves the Canadian supply chain community. We do it by providing trusted information that decision makers need to do their jobs more effectively. We reac

Add to Reading List

Source URL: www.canadianmanufacturing.com

Language: English - Date: 2014-03-17 16:38:37
48Notary / Blind signature / Electronic voting / Digital signature / Trusted third party / RSA / Diffie–Hellman key exchange / Non-repudiation / Alice and Bob / Cryptography / Public-key cryptography / Cryptographic protocols

An Abuse-Free Fair Contract Signing Protocol Based on the RSA Signature Guilin Wang Infocomm Security Department Institute for Infocomm Research (I2 R) 21 Heng Mui Keng Terrace, Singapore[removed]

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-03-31 05:24:15
49Thawte / X.509 / Root certificate / Certificate authority / Public key certificate / Code signing / Public key infrastructure / Verisign / Trusted third party / Cryptography / Public-key cryptography / Key management

Thawte Code Signing Certificates ® Deliver Software Securely and Reliably for Less Thawte® Code Signing Certificates offer strong protection and rigorous verification for

Add to Reading List

Source URL: www.thawte.com

Language: English - Date: 2011-01-19 15:39:03
50Electronic commerce / Computer security / Code signing / Extended Validation Certificate / Public key certificate / Digital signature / Trusted third party / Cryptographic hash function / Entrust / Cryptography / Public-key cryptography / Key management

What is Code Signing? The ins and outs of how code signing works and why it’s necessary Entrust Inc. Reserved.

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-10-18 10:58:12
UPDATE