Trusted third party

Results: 64



#Item
51Thawte / X.509 / Root certificate / Certificate authority / Public key certificate / Code signing / Public key infrastructure / Verisign / Trusted third party / Cryptography / Public-key cryptography / Key management

Thawte Code Signing Certificates ® Deliver Software Securely and Reliably for Less Thawte® Code Signing Certificates offer strong protection and rigorous verification for

Add to Reading List

Source URL: www.thawte.com

Language: English - Date: 2011-01-19 15:39:03
52Employment / Business-education partnerships / Economic development / Workforce development / Business

What’s Working in Colorado Lessons Learned from Sector Partnerships Select a Convener that is trusted by Business Successful sector partnerships have at their core a trusted third party that has credibility with indust

Add to Reading List

Source URL: www.dllr.state.md.us

Language: English - Date: 2013-10-01 07:36:34
53Employment / Business-education partnerships / Economic development / Workforce development / Business

What’s Working in Colorado Lessons Learned from Sector Partnerships Select a Convener that is trusted by Business Successful sector partnerships have at their core a trusted third party that has credibility with indust

Add to Reading List

Source URL: www.dllr.maryland.gov

Language: English - Date: 2013-10-01 07:36:34
54Trusted third party / Symmetric-key algorithm / Cryptography / Public-key cryptography / Pathology Messaging Implementation Project

Workshop eSanté WS 1: Architecture & Security Dr Stefan Benzschawel CRP Henri Tudor – SANTEC [removed]

Add to Reading List

Source URL: www.sante.public.lu

Language: English - Date: 2012-10-13 04:00:01
55Cryptographic protocols / Electronic commerce / Certificate authorities / DigiNotar / DigiCert / Public key certificate / Online Certificate Status Protocol / Trusted third party / Cryptography / Public-key cryptography / Key management

Certificate Transparency Adam Langley, Ben Laurie, Emilia Kasper Al Cutter, Stephen McHenry {agl, benl, ekasper}@google.com

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-09 11:42:06
56Software testing / Vulnerability / Insider / Failure / Data mining / Cyberwarfare / Computer security / Hacking

New CERT Insider Threat Solutions A CALL FOR ACTION…. As a trusted third party between government, industry, and academia, the

Add to Reading List

Source URL: www.cert.org

Language: English - Date: 2014-05-19 12:33:53
57Hacking / Software testing / Vulnerability / Threat / Security / Social vulnerability / The Insider / Insider / Cyberwarfare / Computer security / Computer network security

New CERT Insider Threat Solutions A CALL FOR ACTION…. As a trusted third party between government, industry, and academia, the

Add to Reading List

Source URL: www.cert.org

Language: English - Date: 2014-05-19 12:33:53
58Impact assessment / Program evaluation / Cyberwarfare / Vulnerability / Insider / Evaluation / Evaluation methods / Sociology

New CERT Insider Threat Solutions A CALL FOR ACTION…. As a trusted third party between government, industry, and academia, the

Add to Reading List

Source URL: www.cert.org

Language: English - Date: 2014-06-02 12:34:08
59Public-key cryptography / Government procurement / Trusted third party / Interoperability / E-procurement / Procurement / Technology / Management / Public eProcurement / Electronic commerce / Business / Cryptography

Final report Strategy and implementation roadmaps Preliminary Study on the electronic provision of certificates and attestations usually required in public

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2011-01-26 10:16:05
60Electronic documents / Key management / Man-in-the-middle attack / Communications protocol / Digital signature / Trusted third party / Certified email / Public key infrastructure / Return receipt / Cryptography / Email / Public-key cryptography

Certified Email with a Light On-line Trusted Third Party: Design and Implementation ∗ Mart´ın Abadi

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2003-01-11 00:09:21
UPDATE