Cryptographic engineering

Results: 331



#Item
231Internet standards / Computer networks / AS2 / Internet Engineering Task Force / S/MIME / AS1 / HTML / Globally unique identifier / Electronic data interchange / Computing / Internet / Cryptographic protocols

CISC Business Process Workgroup (BPWG) - Data Interchange Conference Call Date: Wednesday, July 13, 2005

Add to Reading List

Source URL: www.crtc.gc.ca

Language: English - Date: 2005-10-24 09:00:05
232Internet / AS2 / Economy of Canada / Computing / Internet Engineering Task Force / Manitoba Telecom Services / Bell Canada / Internet standards / S&P/TSX Composite Index / Cryptographic protocols

CISC Business Process Workgroup (BPWG) - Data Interchange Conference Call Date: Wednesday, September 21, 2005

Add to Reading List

Source URL: www.crtc.gc.ca

Language: English - Date: 2005-10-24 09:00:05
233Internet standards / Data / AS2 / Secure communication / Internet protocols / HTTP Secure / Internet Engineering Task Force / X.509 / Cryptographic protocols / Computing / Internet

CISC Business Process Workgroup (BPWG) - Data Interchange Conference Call Date: Wednesday, August 10, 2005

Add to Reading List

Source URL: www.crtc.gc.ca

Language: English - Date: 2005-10-24 09:00:05
234Internet standards / AS2 / Electronics / Interoperability / Internet Engineering Task Force / Email / Computing / Internet / Cryptographic protocols

CISC Business Process Workgroup (BPWG) - Data Interchange Conference Call Date: Wednesday, June 15, 2005

Add to Reading List

Source URL: www.crtc.gc.ca

Language: English - Date: 2005-10-24 09:00:05
235FIPS 140 / Cryptographic Module Validation Program / Aruba / Network of Electoral Democracy / Wireless access point / Electronic engineering / Electronics / Cryptography standards / Aruba Networks / Computing

Aruba 3000 and 6000/M3 Mobility Controllers with ArubaOS FIPS Firmware Non-Proprietary Security Policy FIPS[removed]Level 2 Release Supplement Copyright

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-25 12:31:16
236Cryptography standards / Computer security / Electronic engineering / Wireless networking / Cisco Catalyst / Wireless security / Cisco IOS / IEEE 802.11i-2004 / Wi-Fi Protected Access / Computer network security / Computing / Cryptographic protocols

FIPS[removed]Security Policy for Cisco Catalyst 6506, 6506-E, 6509, and 6509-E Switches with Wireless Services Modules (WiSMs) This security policy contains these sections: •

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
237Computing / Internet protocols / Internet standards / Cryptographic protocols / Routing protocols / Border Gateway Protocol / Online Certificate Status Protocol / X.509 / Revocation list / Cryptography / Internet / Public-key cryptography

Evaluating the Performance Impact of PKI on BGP Security Meiyuan Zhao∗and Sean W. Smith Department of Computer Science Dartmouth College David M. Nicol Department of Electrical and Computer Engineering

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 11:08:07
238Cyberwarfare / Telecommunications engineering / Military technology / Communications security / COMSEC / Transmission security / Joint Electronics Type Designation System / Electronic Key Management System / Military communications / Cryptography / Controlled Cryptographic Item

CONTROLLED CRYPTOGRAPHIC ITEM (CCI) BRIEFING 1. As a member of a U.S. military service, agency, department, contractor or an authorized service vendor you have been selected to perform communications electronic maintenan

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2014-01-22 12:29:17
239Cryptographic protocols / Internet protocols / Internet standards / X.509 / Transport Layer Security / Public key infrastructure / Internet Engineering Task Force / HTTP Secure / Certificate authority / Cryptography / Public-key cryptography / Key management

1 Standardizing the Next Generation Public Key Infrastructure Incremental Improvements or Re-Design? Hannes Tschofenig∗ , Tobias Gondrom†

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 13:32:56
240Computing / Secret sharing / Barbara Jane Liskov / Proactive secret sharing / Proactivity / Communications protocol / Transmission Control Protocol / Cryptographic protocols / Data / Information

Mobile Proactive Secret Sharing by David Andrew Schultz Submitted to the Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2008-08-05 16:45:03
UPDATE