Cryptographic protocol

Results: 1374



#Item
921Adobe®  Template Guidelines

Adobe® Template Guidelines

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-04-25 17:36:05
922KOV-26B  NSA Certified Mobile Type 1 Network Security Talon2 is a versatile high-assurance encryptor that enables users to access secure networks from virtually anywhere. Talon2 secures data classified up to TS/SCI acros

KOV-26B NSA Certified Mobile Type 1 Network Security Talon2 is a versatile high-assurance encryptor that enables users to access secure networks from virtually anywhere. Talon2 secures data classified up to TS/SCI acros

Add to Reading List

Source URL: www2.l-3com.com

Language: English - Date: 2014-09-03 13:11:58
923InCommon Certificate Service Relying Party Standard Form Agreement 24 June[removed]InCommon Certificate Service Relying Party Agreement

InCommon Certificate Service Relying Party Standard Form Agreement 24 June[removed]InCommon Certificate Service Relying Party Agreement

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2011-01-21 13:18:06
924NIST Workshop: Improving Trust in the Online Marketplace

NIST Workshop: Improving Trust in the Online Marketplace

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-09 11:40:29
925Evaluating the Performance Impact of PKI on BGP Security Meiyuan Zhao∗and Sean W. Smith Department of Computer Science Dartmouth College David M. Nicol Department of Electrical and Computer Engineering

Evaluating the Performance Impact of PKI on BGP Security Meiyuan Zhao∗and Sean W. Smith Department of Computer Science Dartmouth College David M. Nicol Department of Electrical and Computer Engineering

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 11:08:07
926Controlled Substance Ordering System (CSOS) Certification Practices Statement (CPS) Prepared for Drug Enforcement Administration

Controlled Substance Ordering System (CSOS) Certification Practices Statement (CPS) Prepared for Drug Enforcement Administration

Add to Reading List

Source URL: www.deaecom.gov

Language: English - Date: 2010-07-20 15:25:58
9272nd Annual PKI Research Workshop---Pre-Proceedings  On the usefulness of proof-of-possession N. Asokan, Valtteri Niemi, Pekka Laitinen Nokia Research Center, Finland {n.asokan,valtteri.niemi,pekka.laitinen}@nokia.com

2nd Annual PKI Research Workshop---Pre-Proceedings On the usefulness of proof-of-possession N. Asokan, Valtteri Niemi, Pekka Laitinen Nokia Research Center, Finland {n.asokan,valtteri.niemi,pekka.laitinen}@nokia.com

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-24 19:16:20
928Freedom Fone 2.S API Documentation Table of Contents Authentication ........................................................................................................................1 Restrict access.......

Freedom Fone 2.S API Documentation Table of Contents Authentication ........................................................................................................................1 Restrict access.......

Add to Reading List

Source URL: www.freedomfone.org

Language: English - Date: 2012-02-27 08:20:08
929Verifiable Mixing (Shuffling) of ElGamal Pairs C. Andrew Neff∗ April 21, 2004† Abstract We give an improved presentation of the protocol first published

Verifiable Mixing (Shuffling) of ElGamal Pairs C. Andrew Neff∗ April 21, 2004† Abstract We give an improved presentation of the protocol first published

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2004-04-21 21:18:47
930An Analysis of PKI Issues and Proposed Alternatives

An Analysis of PKI Issues and Proposed Alternatives

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:13:10