X.509

Results: 1596



#Item
281Spamming / Key management / Public-key cryptography / Electronic commerce / Phishing / Social engineering / Public key certificate / Extended Validation Certificate / X.509 / Cryptography / Software / Computing

Beyond the Lock Icon: Real-time Detection of Phishing Websites Using Public Key Certificates Zheng Dong∗ , Apu Kapadia∗ , Jim Blythe† and L. Jean Camp∗ ∗ School

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2015-03-04 19:58:08
282Cryptographic protocols / Online Certificate Status Protocol / X.509 / OMA DRM / Revocation list / Public key certificate / PKCS / Rights Object Acquisition Protocol / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Microsoft Word - CMLA-Technical-Specification-V1Approved.docx

Add to Reading List

Source URL: www.cm-la.com

Language: English - Date: 2014-01-09 13:17:00
283Public key infrastructure / X.509 / Web of trust / Public key certificate / Certificate authority / Authorization certificate / PERMIS / Revocation list / PKI Resource Query Protocol / Cryptography / Public-key cryptography / Key management

1st Annual PKI Research Workshop---Proceedings Improvements on Conventional PKI Wisdom Carl Ellison

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2002-08-03 22:47:04
284Certificate policy / Revocation list / Public key certificate / Online Certificate Status Protocol / Certificate authority / Root certificate / Public key infrastructure / Certification path validation algorithm / X.509 / Cryptography / Public-key cryptography / Key management

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATIONSeptember 2008

Add to Reading List

Source URL: t1c1.pki.qld.gov.au

Language: English - Date: 2010-09-01 01:22:26
285Object-oriented programming / Access control / Identity management / X.509 / Object database / Separation of mechanism and policy / Security / Computing / Computer security

A Flexible Security System for Metacomputing Environments Adam Ferrari, Frederick Knabe, Marty Humphrey, Steve Chapin, and Andrew Grimshaw Department of Computer Science University of Virginia, Charlottesville, VA 22903,

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-04 14:58:14
286Wireless networking / Technology / Internet protocols / Computing / Internet / X.509 / Revocation list / Vehicular communication systems / Online Certificate Status Protocol / Public-key cryptography / Key management / Cryptographic protocols

Paper Title (use style: paper title)

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-07-04 20:03:19
287X.509 / Simple public key infrastructure / Public key infrastructure / Certificate authority / Diffie–Hellman key exchange / Public key certificate / Self-signed certificate / Trusted third party / X.500 / Cryptography / Public-key cryptography / Key management

Certification Infrastructure Needs For Electronic Commerce And Personal Use Carl M. Ellison1 16 July 1997

Add to Reading List

Source URL: theworld.com

Language: English - Date: 2001-09-29 11:54:29
288Certificate policy / Revocation list / Public key certificate / X.509 / Certificate authority / Public key infrastructure / Online Certificate Status Protocol / Root certificate / X.500 / Cryptography / Public-key cryptography / Key management

Queensland Government Information Security Framework UNCLASSIFIED CONSULTATIONSeptember 2008

Add to Reading List

Source URL: t1c1.pki.qld.gov.au

Language: English - Date: 2010-09-01 01:13:26
289Cryptographic protocols / Electronic commerce / Internet standards / Public key certificate / X.509 / Certificate authority / Certificate server / Dynamic SSL / Cryptography / Public-key cryptography / Key management

Exporting SSL certificate for use in Sysax Multi Server Table of Contents 1. Exporting SSL certificate for use in Sysax Multi Server ................................................................... 1

Add to Reading List

Source URL: www.sysax.com

Language: English - Date: 2009-10-31 02:46:10
290Certificate authorities / Cryptographic protocols / Electronic commerce / DigiNotar / Extended Validation Certificate / GlobalSign / Comodo Group / Root certificate / X.509 / Cryptography / Key management / Public-key cryptography

T ECHNOLOGY NE W S Internet Security under Attack: The Undermining of Digital Certificates

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:46:07
UPDATE