Cryptographic engineering

Results: 331



#Item
261Cryptographic protocols / Computing / Aruba Networks / Electronic engineering / Wireless security / Wireless access point / IEEE 802.11i-2004 / IEEE 802.11 / Wireless LAN / Computer network security / Wireless networking / Technology

Tech Brief | Government FIPS Validated 802.11i WLAN Meeting Government Requirements

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2011-03-10 18:13:24
262Electronic engineering / Field-programmable gate array / Luffa / Xilinx / Computing / Electronics / Cryptographic hash functions / Cucurbitaceae / NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:32:28
263Common Criteria / Evaluation Assurance Level / Security Target / Protection Profile / Systems engineering process / Cimcor / Cryptographic Module Testing Laboratory / Evaluation / Computer security / Security

PDF Document

Add to Reading List

Source URL: www.itsc.or.jp

Language: English - Date: 2011-11-14 19:42:55
264Computer network security / Cryptographic protocols / Electronic engineering / IEEE 802.11 / Wi-Fi / Wireless security / Wi-Fi Protected Access / IPad / Wireless access point / Computing / Technology / Wireless networking

WP_iPad-in-Enterprise_110920.indd

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2011-10-03 15:32:03
265Computer network security / Internet protocols / Telecommunications engineering / Cryptographic protocols / Network protocols / Network address translation / IPsec / Firewall / Internet protocol suite / Computing / Network architecture / Data

Developing a Next-Generation Internet Architecture Robert Braden, David Clark, Scott Shenker, and John Wroclawski July 15, 2000 Abstract This document discusses goals and directions for a research effort aimed at develop

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2010-02-17 16:14:58
266Cryptographic protocols / Electronic commerce / X.509 / NSA Suite B Cryptography / Elliptic curve cryptography / Elliptic Curve DSA / Revocation list / Public key certificate / Elliptic curve Diffie–Hellman / Cryptography / Public-key cryptography / Key management

Internet Engineering Task Force (IETF) Request for Comments: 5759 Category: Informational ISSN: [removed]J. Solinas

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-01-24 14:56:32
267Internet Protocol / Universal Mobile Telecommunications System / Internet governance / Cryptographic protocols / Internet protocols / 3GPP / Internet Engineering Task Force / IPsec / Computing / Internet / Network architecture

  FirstNet  Security  Standards   Development        

Add to Reading List

Source URL: www.pscr.gov

Language: English - Date: 2013-06-06 20:27:00
268Procedural programming languages / Domain-specific language / ALGOL 68 / Specification / Portable Document Format / Computing / Software engineering / Programming language theory

Cryptographic Module Design with Domain Specific Languages NIST Workshop on Cryptography for Emerging Technologies and Applications John Launchbury, Nov[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:17:58
269Computer security / Cloud standards / Cryptographic protocols / Internet standards / OAuth / Security token / OpenID / Access token / Hypertext Transfer Protocol / Computing / Security / Internet protocols

Internet Engineering Task Force (IETF) Request for Comments: 6750 Category: Standards Track ISSN: [removed]M. Jones

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2012-10-12 18:41:32
270Computing / Computer programming / Cryptographic hash functions / Software engineering / Business intelligence / SAS / Hash function / Hash table / Hash list / Search algorithms / Error detection and correction / Hashing

PharmaSUG[removed]Paper CC13 Creating a Clinical Summary Table within a Single DATA Step with the Dynamic Trio: DOSUBL(), Hash Objects, and ODS Objects Joseph Hinson, Princeton, NJ ABSTRACT

Add to Reading List

Source URL: www.pharmasug.org

Language: English - Date: 2013-05-05 15:33:41
UPDATE