Cryptography standards

Results: 2254



#Item
891Secure communication / Computing / Internet / Internet standards / Cryptographic software / Transport Layer Security / Cipher suite / RC4 / Password / Internet protocols / Cryptography / Cryptographic protocols

SSL/TLS Deployment Best Practices

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2014-12-05 16:38:54
892Internet protocols / Internet standards / X.509 / Internet / Public key certificate / SCVP / Certificate policy / CRL Group / Computing / Public-key cryptography / Cryptographic protocols / Key management

Federal Public Key Infrastructure Technical Working Group Meeting Minutes Prepared for the General Services Administration By SRA International

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2015-01-12 10:12:17
893Cryptographic protocols / IEEE 802.11 / Wireless networking / Cryptography standards / National Information Assurance Partnership / Common Criteria Testing Laboratory / CCMP / Common Criteria Evaluation and Validation Scheme / Protection Profile / Cryptography / Evaluation / Computer security

National Information Assurance Partnership ® Common Criteria Evaluation and Validation Scheme T

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-11-19 17:25:24
894Electronic commerce / Public key certificate / Professional certification / Academic certificate / Key management / Public-key cryptography / Standards

1100_FAMI-QS_Certificate_template PCS Phopshate 2014v2

Add to Reading List

Source URL: www.potashcorp.com

Language: English - Date: 2015-01-06 10:51:52
895Public key certificate / Public-key cryptography / Credential / Professional certification / Certified teacher / Social Security number / Security / Information / Evaluation / Standards / Electronic commerce / Key management

Page 1 Certification Application (CA[removed]Commonwealth of Kentucky EDUCATION PROFESSIONAL STANDARDS BOARD

Add to Reading List

Source URL: www.epsb.ky.gov

Language: English - Date: 2014-12-22 12:28:38
896Cryptographic protocols / Secure communication / Electronic commerce / Internet standards / Public-key cryptography / HTTP Secure / Transport Layer Security / Password / Verisign / Cryptography / Computing / Internet

Internet Banking Security The Internet Banking System brings together a combination of industry-approved security technologies to protect data for the bank and for you, our customer. It features passwordcontrolled syste

Add to Reading List

Source URL: www.clarkebank.com

Language: English - Date: 2014-06-27 10:43:48
897Key management / Electronic commerce / Elliptic curve cryptography / IEEE P1363 / Strong prime / RSA / Digital signature / Digital Signature Algorithm / PKCS / Cryptography / Public-key cryptography / Cryptography standards

Public Comments Regarding FIPS 186-1, Digital Signature Standard (DSS) [in response to a notice in the December 15, 1998 Federal Register (Volume 63, Number 240; pages[removed]From: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-04-12 16:50:34
898Electronic commerce / Public key certificate / Police certificate / Alcohol licensing laws of the United Kingdom / Licensing Act / Cryptography / Key management / Public-key cryptography

Special Restaurant Licence A Special Restaurant Licence entitles the Licensee to sell alcohol for consumption on the Licensed premises only. According to the S.I. No[removed] — Special Restaurant Licence (Standards) R

Add to Reading List

Source URL: www.pointofsinglecontact.ie

Language: English - Date: 2014-08-06 07:32:50
899ETSI Satellite Digital Radio / European Telecommunications Standards Institute / Environmental tests / Cryptography standards

EN[removed]V2[removed]Environmental Engineering (EE); Environmental conditions and environmental tests for telecommunications equipment; Part 2-1: Specification of environmental tests; Storage

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-10-06 09:42:59
9003GP and 3G2 / European Telecommunications Standards Institute / ICE / Keccak / VEST / System Architecture Evolution / GSM / Cryptography / 3GPP / Computing

TS[removed]V12[removed]Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2,

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-10-22 07:44:41
UPDATE