Cryptography standards

Results: 2254



#Item
81Cryptography / Cryptography standards / Pseudorandom number generators / Key management / FIPS 140-2 / Random number generation / Dual EC DRBG / Key / Cryptographic primitive / Entropy / Cryptographic Module Validation Program / Block cipher

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2016-06-07 14:19:23
82Cryptography / ISO standards / Ubiquitous computing / Computer security / Prevention / Computer access control / Password / Contactless smart card / Challengeresponse authentication / Key-agreement protocol / Smart card / Key

Password Authenticated Key Agreement for Contactless Smart Cards Dennis Kügler1, Heike Neumann2, Sebastian Stappert2, Markus Ullmann1, Matthias Vögeler2 1

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:14
83Cryptography / Public-key cryptography / Professional certification / Standards / Public key certificate / Usability / Fraunhofer Society / Patent attorney

Microsoft Word - Anlage 1_KVA PZS-01_Anmeldung Prüfung_EN_2016_07_05_1.docx

Add to Reading List

Source URL: www.personenzertifizierung.fraunhofer.de

Language: English - Date: 2016-07-21 03:58:51
84Product certification / Cryptography / Standards organizations / Business / Technischer berwachungsverein / TV SD / Public key certificate / Pressure Equipment Directive

CERTIFICATE The Certification Bodyof TÜV SÜD Industrie Service GmbH certifies that Soundcast Company 1731 Placentia Avenue

Add to Reading List

Source URL: www.cla-val.com

Language: English - Date: 2016-06-03 16:40:27
85Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Cryptography standards / X.509 / Internet Standards / PKCS / Code signing / Portable Executable / Public key certificate / Cryptographic Message Syntax

Windows Authenticode Portable Executable Signature Format Version 1.0 — March 21, 2008  Abstract Authenticode® is a digital signature format that is used to determine the origin and integrity of software binaries. A

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-07-29 12:01:34
86Cryptography / International Electrotechnical Commission / Standards organizations / BSI Group / Kitemark / Public key certificate / Identity document

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: Þjóðskrá Íslands (Registers Iceland)

Add to Reading List

Source URL: www.skra.is

Language: English - Date: 2015-12-11 09:47:50
87Computing / Software / Internet / Domain name system / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Unbound / NSD / Comparison of DNS server software

DNSSEC software at NLnet Labs Jelte Jansen http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:02
88Domain name system / Internet / Computing / Network architecture / Internet Standards / Internet protocols / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / CNAME record / DNS zone transfer / OpenDNSSEC

DNSSEC Check Proxy - revision 1 Matthijs Mekking1 , Willem Toorop2 , NLnet Labs NLnet Labs documentOctober 3, 2011

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2012-04-17 06:07:30
89Cryptography standards / Computer law / Signature / E-commerce / Regulation / EIDAS / Public key certificate / Electronic signature / Authentication / Trust service provider / Draft:Test Qualified digital certificate

European Regulation on Electronic Título de presentación Identification and Trust Services Raúl Rubio Nombre Baker

Add to Reading List

Source URL: www.observatoriotui.com

Language: English
90Internet Standards / Internet protocols / Dark web / Internet privacy / Onion routing / Routing / Crowds / Communications protocol / Tor / Proxy server / Public-key cryptography / Anonymity

A Model of Onion Routing with Provable Anonymity Joan Feigenbaum1? , Aaron Johnson1?? , and Paul Syverson2? ? ? 1 Yale University {Joan.Feigenbaum, aaron.johnson}@yale.edu

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2007-01-12 11:50:43
UPDATE