X.509

Results: 1596



#Item
311Cryptographic protocols / Cryptography standards / Electronic commerce / X.509 / Public key certificate / Certificate authority / PKCS12 / PKCS / HTTP Secure / Cryptography / Public-key cryptography / Key management

Microsoft Word - handouts-get-a-cert-LCGdoc

Add to Reading List

Source URL: www.nikhef.nl

Language: English - Date: 2004-01-09 04:22:48
312Cryptographic protocols / Internet protocols / Internet standards / Certificate policy / X.509 / CA/Browser Forum / Revocation list / Online Certificate Status Protocol / Public key certificate / Cryptography / Public-key cryptography / Key management

Microsoft Word - CAB Forum BRdoc

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2015-05-05 16:52:42
313Computing / Computer architecture / Cyberinfrastructure / E-Science / X.509 / Public key certificate / P-GRADE Portal / GLite / Grid computing / Public-key cryptography / Concurrent computing

Grid Security Workshop Dec 02

Add to Reading List

Source URL: www.nesc.ac.uk

Language: English - Date: 2002-12-09 12:24:26
314Cryptographic protocols / Cryptographic software / X.509 / Public key certificate / Certificate authority / OpenSSL / GLite / Cryptography / Public-key cryptography / Key management

Grid Tutorial G RID M IDDLEWARE H ANDOUTS FOR

Add to Reading List

Source URL: www.nikhef.nl

Language: English - Date: 2004-09-01 11:30:11
315Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 16:50:19
316X.509 / Certificate authority / Extended Validation Certificate / Public key certificate / Public key infrastructure / Computational trust / HTTP Secure / Phishing / Self-signed certificate / Cryptography / Key management / Public-key cryptography

Trust Views for the Web PKI Johannes Braun, Florian Volk, Johannes Buchmann and Max M¨ uhlh¨auser Technische Universit¨ at Darmstadt/CASED Hochschulstraße 10, 64283 Darmstadt, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-12 06:36:08
317Cryptographic protocols / Internet protocols / Electronic commerce / Public key certificate / X.509 / Revocation list / Certificate authority / Certificate server / Certification path validation algorithm / Cryptography / Public-key cryptography / Key management

Managing Access to Resources on the Grid - Presentation eSI 4 Dec 02

Add to Reading List

Source URL: www.nesc.ac.uk

Language: English - Date: 2002-12-04 13:43:17
318Electronic commerce / MD5 / Hashing / Collision attack / X.509 / SHA-1 / Padding / Collision / Preimage attack / Cryptography / Public-key cryptography / Cryptographic hash functions

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-05 01:53:21
319X.509 / RSA / Public key certificate / Padding / Digital signature / Cryptographic hash function / Arjen Lenstra / PKCS / Collision attack / Cryptography / Public-key cryptography / MD5

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-01 09:05:12
320Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 16:50:19
UPDATE