Cryptographic protocol

Results: 1374



#Item
991Cryptographic protocols / Internet protocols / Internet standards / Revocation list / Public key certificate / Online Certificate Status Protocol / Certificate authority / Warranty / X.509 / Cryptography / Public-key cryptography / Key management

InCommon Certificate Service Relying Party Standard Form Agreement 24 June[removed]InCommon Certificate Service Relying Party Agreement

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2010-08-05 08:10:33
992Cryptographic protocols / Certificate policy / X.509 / Public key certificate / Revocation list / Certificate authority / Online Certificate Status Protocol / Public key infrastructure / Transport Layer Security / Cryptography / Public-key cryptography / Key management

InCommon Certification Practices Statement for the InCommon IGTF Server Certification

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2014-06-04 09:19:33
993Cryptographic protocols / Certificate policy / Revocation list / X.509 / Public key certificate / Online Certificate Status Protocol / Certificate authority / Public key infrastructure / Comodo Group / Cryptography / Public-key cryptography / Key management

InCommon Certification Practices Statement for Code SigningServer Certificates

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2011-07-05 09:14:54
994Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
995Cloud computing / Man-in-the-middle attack / Key management / Public-key cryptography / Software as a service / Cryptographic protocol / Novell Cloud Security Service / IICCRD / Computing / Centralized computing / Cryptography

Securely Managing Cryptographic Keys used within a Cloud Environment Dr. Sarbari Gupta [removed[removed]ext 12

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:10:00
996Information technology management / Crime prevention / National security / Internet protocols / Internet standards / Authentication / Simple Network Management Protocol / Computer security / Cryptographic protocol / Security / Computing / Computer network security

Privilege Management Protocols

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:07:22
997Radio resource management / Multiplexing / Broadcast engineering / Computer network security / Fading / Wireless security / Channel / Rayleigh fading / Cryptographic protocol / Technology / Telecommunications engineering / OSI protocols

Signal-Flow-Based Analysis of Wireless Security Protocols C ¸ a˘gatay C ¸ apara , Dennis Goeckela , Kenneth G. Patersonb,∗, Elizabeth A. Quagliab , Don Towsleya , Murtaza Zaferc

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-09-26 09:12:44
998Wireless networking / Cryptography / Technology / IEEE 802.11 / Wireless security / EAP-SIM / Extensible Authentication Protocol / Wi-Fi Protected Access / Wireless LAN / Cryptographic protocols / Computer network security / Computing

Report on DIMACS∗ Workshop on Mobile and Wireless Security Date of Workshop: November 3 - 4, 2004

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-05-10 10:32:50
999Public-key cryptography / Computing / Internet standards / Data / Online Certificate Status Protocol / HTTP / HTTP Secure / Comodo Group / X.509 / Cryptographic protocols / Internet protocols / Internet

Certificate Profile InCommon Standard Client CA Version 0.9 January 24, 2011 Field Name Value

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2011-10-20 13:27:07
1000Internet protocols / Internet standards / Cryptographic protocols / FTP / HTTP / HTTP Secure / File Transfer Protocol / Port / FTPS / Internet / Computing / Network architecture

App3.11_Test_Site_Security_VF

Add to Reading List

Source URL: education.alaska.gov

Language: English - Date: 2014-08-05 17:22:43
UPDATE