Cryptography standards

Results: 2254



#Item
181Security / Prevention / Safety / Computer security / National security / Crime prevention / Cryptography / Information security / Apollo / Access control / Vulnerability / Security awareness

Apollo Education Group Information Security Third Party Information Security Standards Document Type: Standard Document Serial No. [TBD per applicable matrix]

Add to Reading List

Source URL: www.apollo.edu

Language: English - Date: 2016-02-17 20:25:04
182Cryptography / Quality assurance / Evaluation / Business / Accreditation / Standards / United Kingdom Accreditation Service / Vehicle Certification Agency / Public key certificate / FANUC / Professional certification

C ER T IF IC AT E OF R E G I S T R AT IO N

Add to Reading List

Source URL: robot.fanucamerica.com

Language: English - Date: 2015-09-18 10:33:59
183

Elliptic Curves a Hardware Perspective Joppe W. Bos NIST Workshop on Elliptic Curve Cryptography Standards June 11- June, Gaithersburg, MD, USA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-06-08 08:37:26
    184Information privacy / Economy / E-commerce / Payment cards / Security / Computer security / Secure communication / Cryptography / Payment Card Industry Data Security Standard / Payment card industry / Data breach / PCI

    Media Contacts Lindsay Goodspeed PCI Security Standards Council +Twitter @PCISSC

    Add to Reading List

    Source URL: www.pcisecuritystandards.org

    Language: English - Date: 2015-09-29 16:20:11
    185Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

    FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-08-04 11:33:21
    186Computing / Internet / Cryptography / Cybercrime / Internet Standards / Internet protocols / Cyberwarfare / National security / Denial-of-service attack / Computer security / Border Gateway Protocol / DNS spoofing

    Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents Yang Liu1 , Armin Sarabi1 , Jing Zhang1 , Parinaz Naghizadeh1 Manish Karir2 , Michael Bailey3 , Mingyan Liu1,2 1 EECS Department, University of Michiga

    Add to Reading List

    Source URL: mdbailey.ece.illinois.edu

    Language: English - Date: 2015-08-05 18:31:26
    187Computer security / Cryptography / Computer access control / Cybercrime / Social engineering / Cloud standards / Hypertext Transfer Protocol / Phishing / Password / Cross-site scripting / OpenID / Multi-factor authentication

    PhishSafe: Leveraging Modern JavaScript API’s for Transparent and Robust Protection Bastian Braun Martin Johns

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English
    188Security / Cyberwarfare / Computing / Smart grid / Computer network security / Computer security / Cryptography / National security / Smart meter / Internet privacy / Privacy policy / National Institute of Standards and Technology

    Microsoft Word - Integrity-Security Principles)

    Add to Reading List

    Source URL: www.smartgrid.gov

    Language: English - Date: 2015-02-12 06:56:48
    189Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

    A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    190Key management / Cryptography standards / Cryptography / FIPS 201 / Standards / Key size / Cryptographic hash function / Key / Cryptographic Module Validation Program / Digital Signature Algorithm / Public-key cryptography / Smart card

    NIST Special Publication

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-06-10 13:59:58
    UPDATE