X.509

Results: 1596



#Item
321Cryptographic protocols / Internet protocols / Internet standards / Asia-Pacific Network Information Centre / X.509 / Revocation list / Online Certificate Status Protocol / Public key certificate / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Update Critical Infrastructure to Include PKI Tom Paseka APNIC-34, 30 August Phnom Penh Introduction

Add to Reading List

Source URL: conference.apnic.net

Language: English - Date: 2012-08-28 03:31:53
322Directory services / Internet protocols / Cryptographic protocols / Revocation list / X.509 / Lightweight Directory Access Protocol / X.500 / Public key certificate / Public key infrastructure / Cryptography / Public-key cryptography / Key management

World Leading Directory Technology White Paper: ViewDS and PKI Identity Management and XML Directory Services Solutions

Add to Reading List

Source URL: viewds.com

Language: English - Date: 2015-03-12 01:00:36
323Internet protocols / Internet standards / Electronic commerce / X.509 / Online Certificate Status Protocol / Internet Engineering Task Force / Public key certificate / Microsoft CryptoAPI / Cryptography / Public-key cryptography / Cryptographic protocols

JNSA Challenge PKI 2002 ? Work in progress ? An approach of Multi-Domain PKI Test Suite

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-07-10 05:05:00
324Security / Cyberwarfare / Electronic commerce / Internet / Internet protocols / Root certificate / X.509 / Public key certificate / Certificate authority / Public-key cryptography / Key management / Cryptographic protocols

雲端運算服務五年計畫

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2015-04-17 13:20:22
325Cryptographic protocols / Electronic commerce / Secure communication / Public key certificate / Transport Layer Security / X.509 / Root certificate / Certificate authority / HTTP Secure / Cryptography / Public-key cryptography / Key management

Security Certificates an overview Xavier Belanger January 24, 2015

Add to Reading List

Source URL: www.ellendhel.net

Language: English - Date: 2015-01-27 08:11:19
326Identity management / Public-key cryptography / Cryptographic protocols / Security Assertion Markup Language / Digital identity / OpenID / X.509 / Internet privacy / Assertion / Cryptography / Federated identity / Computer security

Selective Disclosure (v0.2) Ben Laurie () May 11, 2007 Abstract

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2007-05-11 06:26:34
327Cryptographic protocols / Internet / Data / Secure communication / Electronic commerce / Transport Layer Security / Lightweight Directory Access Protocol / X.509 / Null / Computing / Internet protocols / Internet standards

Null Prex Atta ks Against SSL/TLS Certi ates Moxie MarlinspikeAbstra t

Add to Reading List

Source URL: www.thoughtcrime.org

Language: English - Date: 2015-03-19 19:41:06
328X.509 / CA/Browser Forum / Public key certificate / Extended Validation Certificate / Revocation list / Certificate authority / Root certificate / Self-signed certificate / Online Certificate Status Protocol / Cryptography / Key management / Public-key cryptography

Web PKI: Closing the Gap between Guidelines and Practices Antoine Delignat-Lavaud‡ , Mart´ın Abadi† , Andrew Birrell† , Ilya Mironov† , Ted Wobber† , and Yinglian Xie† † Microsoft Research

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2013-12-09 14:12:28
329Cryptographic protocols / Time / Digital signature / Public key certificate / Revocation list / X.509 / Authorization certificate / Timestamp / Postage stamp / Cryptography / Public-key cryptography / Key management

General principles of digital signature verification 7th November 2002 Contents 1 Abstract

Add to Reading List

Source URL: www.timestamp.cyber.ee

Language: English - Date: 2003-01-29 09:32:12
330Cryptographic protocols / Notary / Digital signature / X.509 / Public key certificate / Pretty Good Privacy / Certificate authority / Electronic signature / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Signatures: an Interface between Law and Technology Ben Laurie Nicholas Bohm

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2006-10-26 22:06:14
UPDATE