Trusted timestamping

Results: 28



#Item
11Computer security / Time / Trusted timestamping / Symmetricom / Traceability / Calibration / Accuracy and precision / Statistics / Measurement / Thought

5-5 Development of the Trusted Time Stamping System IWAMA Tsukasa, KURIHARA Noriyuki, IMAE Michito, IMAMURA Kuniyasu, KOTAKE Noboru, GOTOH Tadahiro, SUZUYAMA Tomonari, and MORIKAWA Takao IT social infrastructures based o

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2014-01-20 00:16:34
12Public-key cryptography / PAdES / XAdES / CAdES / Trusted timestamping / Digital signature / Public key infrastructure / Electronic signature / Public key certificate / Cryptography / Cryptography standards / Key management

Assortiment de produits LuxTrust

Add to Reading List

Source URL: www.luxembourg-security.com

Language: English - Date: 2014-11-25 12:03:41
13Crime prevention / Certificate policy / Key management / FIPS 140-2 / Public safety / Information security / Trusted timestamping / Computer security / Security / Cryptography standards

Microsoft Word - ILNAS_PKI_A007.docx

Add to Reading List

Source URL: www.portail-qualite.public.lu

Language: English - Date: 2014-04-25 04:45:48
14Public-key cryptography / PAdES / XAdES / CAdES / Trusted timestamping / Digital signature / Public key infrastructure / Electronic signature / Public key certificate / Cryptography / Cryptography standards / Key management

Assortiment de produits LuxTrust

Add to Reading List

Source URL: www.luxembourg-internet-days.com

Language: English - Date: 2014-11-25 12:03:41
15Computer security / Key management / Trusted timestamping / Timestamp / GlobalSign / Code signing / Public key certificate / Non-repudiation / Electronic signature / Cryptography / Time / Public-key cryptography

timestamping-service-datasheetv2

Add to Reading List

Source URL: www.globalsign.com

Language: English - Date: 2013-11-19 15:27:25
16Cryptographic protocols / Key / Data security / Digital signature / Public key certificate / Trusted timestamping / Transient-key cryptography / Implicit certificate / Cryptography / Key management / Public-key cryptography

Secure… Cryptographic Time-Stamps Through Transient Key Technology By: Paul Doyle of ProofSpace

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
17Error detection and correction / SHA-2 / SHA-1 / MD5 / Digital signature / Hash list / Hash function / Trusted timestamping / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

Long-lived digital integrity using short-lived hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:39:50
18Computer security / Trusted timestamping / Internet protocols / Internet standards / Time stamp protocol / Timestamp / Transmission Control Protocol / Trust anchor / X.509 / Cryptography / Cryptographic protocols / Time

Trusted Archive Authority

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:43:06
19Notary / Electronic signature / Public key certificate / Digital signature / Signature / Document / Trusted timestamping / Digital Postmarks / Cryptography / Key management / Public-key cryptography

Comments regarding Draft guidance 00D-1539 Guidance for Industry 21 CFR Part 11; Electronic Records; Electronic Signatures Maintenance of Records I have a major issue with the detail provided in section[removed]Unavoida

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2002-12-11 14:06:26
20Data / Timestamp / X.509 / Transmission Control Protocol / Computing / Trusted timestamping / ANSI ASC X9.95 Standard / Cryptographic protocols / Time / Information

Trusted Archiving 3rd PKI Research Workshop April 13, 2004 Santosh Chokhani - [removed] Carl Wallace - [removed]

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-04-05 18:30:26
UPDATE