Cryptography standards

Results: 2254



#Item
131Domain name system / Internet protocols / Internet Standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Denial-of-service attack / Name server / Localhost / DNS spoofing / Google Public DNS

University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-02-14 04:49:27
132Information privacy / Peripheral Component Interconnect / Payment cards / Cryptography / Conventional PCI / Payment card industry / Information security / Data security / PA-DSS / Payment Card Industry Data Security Standard

PCI SSC CODE OF PROFESSIONAL RESPONSIBILITY The PCI Security Standards Council (PCI SSC) has developed this Code of Professional Responsibility to define the expectations for professional and ethical conduct of all PCI S

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-01-15 12:54:38
133Cryptography standards / Computer law / Signature / Regulation / EIDAS / Electronic signature / Directorate General for Communications Networks /  Content and Technology / European Union / Advanced electronic signature / Draft:Test Qualified digital certificate

eIDAS Regulation (EU "Demystifying the new eIDAS framework: Regulation and Implementing Acts – content, intention & impact" e-Signatures & e-Seals –

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
134Standards organizations / Product certification / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Professional certification / Sai / SAI Global

Microsoft Word - 001261_QMS_ENG RR

Add to Reading List

Source URL: containerboard.kruger.com

Language: English - Date: 2015-09-14 11:12:21
135Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Block cipher mode of operation / SHA-1 / Hash-based message authentication code / Cryptographic Module Testing Laboratory / FIPS 140-3

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
136Cryptography / Electronic health records / Health Insurance Portability and Accountability Act / Crime prevention / Information governance / National security / Medical privacy / Protected health information / Health Information Technology for Economic and Clinical Health Act / Computer security / Encryption / Cloud computing security

HIPAA COMPLIANCE GUIDE HIPAA Compliance The Health Insurance Portability and Accountability Act (HIPAA) lays out privacy and security standards that protect the confidentiality of patient health information. In terms of

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2016-08-08 05:14:20
137Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
138Signature / Cryptography standards / Public-key cryptography / E-commerce / Computer law / Public key certificate / Authentication / Electronic signature / FIPS 140-2 / Digital signature / Qualified electronic signature / RSA SecurID

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-07-09 04:32:36
139Elliptic curve cryptography / Finite fields / Public-key cryptography / Group theory / Elliptic curve / Complex multiplication

Standards for Efficient Cryptography SEC X.1: Supplemental Document for Odd Characteristic Extension Fields Nippon Telephone and Telegraph Corporation Contact: Kazumaro Aoki, Tetsutaro Kobayashi, and Akira Nagai

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
140Cryptography / Cryptographic software / ISO standards / Hardware security module / Smart card / BitLocker / USB / Key / Secure Hash Algorithm / NSA Suite B Cryptography / Elliptic curve cryptography / Rosetta

PocketVault™ Smart USB 3.0 Dual Storage and Integrated Rosetta® PKI Smart Card Capability Protect the Key In Your Pocket PocketVault Smart USB 3.0 combines SSD storage with a Rosetta Hardware Security Module (HSM) to

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:26:38
UPDATE