Cryptography standards

Results: 2254



#Item
91Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Federal Information Security Management Act / Cryptographic Module Testing Laboratory / FIPS 140-3

Microsoft Word - Outline_Intro_FIPS140-2.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
92Secure communication / Public-key cryptography / Key management / Cryptographic protocols / Internet Standards / Cipher suite / Transport Layer Security / Elliptic curve cryptography / Elliptic curve DiffieHellman / Key size / Key / Client certificate

Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:45
93Signature / Cryptography standards / Computer law / EIDAS / Qualified electronic signature / Trust service provider / Norbert Pohlmann / Electronic signature / Digital signature / Gelsenkirchen / Electronic identification / Advanced electronic signature

eIDAS remote signatures and seals  A concept for server-side signatures Prof. Dr. (TU NN)

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2016-07-01 02:32:18
94Computer security / Quality / Cryptography / Data security / Information security / National security / Management system

QUALITY AND INFORMATION SECURITY MANAGEMENT SYSTEM POLICY HGC’s Quality and Information Security Policy Statement: Operational standards of efficiency, effectiveness, quality and information security are observed in al

Add to Reading List

Source URL: www.hgc.gov.ph

Language: English - Date: 2016-04-15 11:52:38
95Secure communication / Internet Standards / Cryptographic protocols / Internet protocols / Internet security / Transport Layer Security / Cipher suite / RC4 / Transmission Control Protocol / Cryptography / Galois/Counter Mode / TLS-SRP

Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:58
96Data security / Crime prevention / Privacy / Cryptography / National security / Information privacy / Regulatory compliance / Information security / Personally identifiable information / Hong Kong Police Force / Internet privacy / Computer security

STANDARDS FOR LAW ENFORCEMENT DATA SECURITY STANDARDS FOR LAW ENFORCEMENT DATA SECURITY September 2014

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-04-18 00:53:17
97Regional Internet registries / Routing protocols / Public-key cryptography / Resource Public Key Infrastructure / NLnet / Internet Standards / Border Gateway Protocol / Asia-Pacific Network Information Centre / AFRINIC / Internet / IPv6 / American Registry for Internet Numbers

Internet  Rou*ng  Security:   What’s  Next?   Benno  Overeinder   NLnet  Labs   http://www.nlnetlabs.nl/

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-01-18 09:16:13
98Cryptography / Smart cards / ISO standards / Ubiquitous computing / Computer access control / Communications security / Public-key cryptography / Subscriber identity module / Encryption / Point to Point Encryption / Contactless smart card

United States Patent] Chaum

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:12
99Cryptographic protocols / Internet Standards / Internet protocols / Public-key cryptography / Transport Layer Security / OpenSSL / Certificate authority / Authentication / Password

Transition to DOEGrids CA l l l l l

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-05-14 18:51:50
100Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology / SHA-1 / Cryptographic Module Testing Laboratory

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 06:51:53
UPDATE