<--- Back to Details
First PageDocument Content
Public-key cryptography / Protection Profile / Common Criteria / Electronic signature / Public key certificate / Evaluation Assurance Level / Integrity / CAdES / Ethics / Evaluation / Computer security / Key management
Date: 2013-02-14 10:25:38
Public-key cryptography
Protection Profile
Common Criteria
Electronic signature
Public key certificate
Evaluation Assurance Level
Integrity
CAdES
Ethics
Evaluation
Computer security
Key management

Microsoft Word - WD1 EN_14169-4_(E)_v1.0.1_KGTCCGA.doc

Add to Reading List

Source URL: sogis.eu

Download Document from Source Website

File Size: 724,40 KB

Share Document on Facebook

Similar Documents

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

DocID: 1xW1P - View Document

A2J Evaluation and Research Options  Process Evaluation Formative Assessment

A2J Evaluation and Research Options Process Evaluation Formative Assessment

DocID: 1xVZa - View Document

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

DocID: 1xVYB - View Document

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

DocID: 1xVWY - View Document

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document