X.509

Results: 1596



#Item
981Cryptographic protocols / Internet protocols / Internet standards / X.509 / Transport Layer Security / Public key infrastructure / Internet Engineering Task Force / HTTP Secure / Certificate authority / Cryptography / Public-key cryptography / Key management

1 Standardizing the Next Generation Public Key Infrastructure Incremental Improvements or Re-Design? Hannes Tschofenig∗ , Tobias Gondrom†

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 13:32:56
982Key management / Internet protocols / Internet standards / X.509 / Certificate Management Protocol / Public key infrastructure / Certificate authority / Public key certificate / PKCS / Cryptography / Public-key cryptography / Cryptographic protocols

2nd Annual PKI Research Workshop---Pre-Proceedings On the usefulness of proof-of-possession N. Asokan, Valtteri Niemi, Pekka Laitinen Nokia Research Center, Finland {n.asokan,valtteri.niemi,pekka.laitinen}@nokia.com

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-24 19:16:20
983Electronic commerce / X.509 / Public key certificate / Trust / Public-key cryptography / Ethics / Key management

5th Annual PKI R&D Workshop April 4-6, 2006 CAUDIT PKI Federation A Higher Education Sector Wide Approach

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-04-06 15:36:46
984Water / X.509 / Electronic Chart Display and Information System / International Hydrographic Organization / Hydrographic office / Transport / Technology / Electronic navigation / S-63 / Electronic navigational chart

INTERNATIONAL HYDROGRAPHIC ORGANISATION IHO DATA PROTECTION SCHEME Edition 1.1.1 – April[removed]IHO Publication S-63

Add to Reading List

Source URL: digaohm.semar.gob.mx

Language: English - Date: 2014-09-18 13:29:36
985Certificate policy / Revocation list / X.509 / Public key certificate / Certificate authority / Public key infrastructure / Online Certificate Status Protocol / Cryptography / Public-key cryptography / Key management

Controlled Substance Ordering System (CSOS) Certificate Policy (CP) Prepared for Drug Enforcement Administration

Add to Reading List

Source URL: www.deaecom.gov

Language: English - Date: 2010-07-20 15:26:02
986X.509 / Revocation list / Public key certificate / Certificate authority / Digital signature / Public key infrastructure / PKI Resource Query Protocol / Cryptography / Public-key cryptography / Key management

How to build a PKI that works Peter Gutmann University of Auckland How to build an X.509 PKI that works Peter Gutmann

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-04-13 18:04:20
987Cryptographic protocols / Internet privacy / Email authentication / Public key infrastructure / X.509 / Secure messaging / S/MIME / Public key certificate / XKMS / Cryptography / Public-key cryptography / Key management

Improving Message Security With a Self-Assembling PKI Jon Callas Chief Technical and Security Officer 28 April 2003

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 12:04:46
988Cryptographic protocols / Internet standards / Public key infrastructure / Revocation list / X.509 / ID-based encryption / Online Certificate Status Protocol / SCVP / Public key certificate / Cryptography / Public-key cryptography / Key management

An Analysis of PKI Issues and Proposed Alternatives

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:13:10
989Cryptographic protocols / Internet protocols / Internet standards / X.509 / SCVP / Public key certificate / Revocation list / Certificate authority / Self-signed certificate / Cryptography / Public-key cryptography / Key management

Microsoft Word - PKI-Workshop-VA-paper-final-Olnes.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-02-02 14:32:56
990Cryptographic protocols / X.509 / Electronic commerce / GlobalSign / Certificate authority / Public key certificate / Namespace / Identifier / Cryptography / Public-key cryptography / Key management

Using least privileged design principals to improve trust in the online marketplace Ryan Hurst, GlobalSign [removed] @rmhrisk

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-11 12:00:58
UPDATE