Cryptography standards

Results: 2254



#Item
961Internet / Internet protocols / Internet standards / Secure communication / Public-key cryptography / Transport Layer Security / Extensible Messaging and Presence Protocol / Internet security / Vulnerability / Computing / Cryptography / Cryptographic protocols

Improving Security on the Internet (with improved Collaboration) Hannes Tschofenig [removed] Abstract Securing the Internet has been an on-going activity since the early days of the IETF and a variety of

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-03-10 16:49:33
962Advanced Encryption Standard process / National Institute of Standards and Technology / Cryptography standards / Data Encryption Standard / LOKI97 / Key size / AES implementations / SAFER / MAGENTA / Cryptography / Advanced Encryption Standard / Block ciphers

Status of the Advanced Encryption Standard (AES) Development Effort James Foti * National Institute of Standards and Technology Keywords: AES, Advanced Encryption Standard, cryptography, encryption.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
963Key management / National security / Evaluation / Crime prevention / Cryptography standards / Common Criteria / Protection Profile / Security Target / FIPS 140-2 / Cryptography / Computer security / Security

PROTECTION PROFILES FOR CERTIFICATE ISSUING & MANAGEMENT SYSTEMS A. Arsenault, US DoD Phone: [removed]FAX: [removed]E-mail: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
964Cryptographic protocols / Internet protocols / Internet standards / Domain Name System Security Extensions / Public key certificate / X.509 / HTTP Secure / Cryptography / Public-key cryptography / Key management

Why Provable Transparency is Useful Against Surveillance Ben Laurie, Google (benl@google,com), 11 Jan 2014. Background Certificate Transparency (RFC 6962) is an example of a general mechanism which perm

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
965Internet standards / Internet protocols / Computing / Authentication protocol / TSIG / Public-key cryptography / Password / Cryptography / Cryptographic protocols / Internet

Automatically Detecting Authentication Limitations in Commercial Security Protocols Stephen H. Brackin  Arca Systems, Inc. 303 E. Yates St. Ithaca, NY 14850

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
966Public key certificate / Public-key cryptography / Professional certification / Standards / Key management / Electronic commerce

CERTIFICATE OF REGISTRATION This is to certify that E-CYCLE LLC 4105 Leap Road, Hilliard, Ohio[removed]USA

Add to Reading List

Source URL: www.e-cycle.com

Language: English - Date: 2014-10-29 14:14:54
967Crime prevention / National security / Computer network security / Key management / ISO standards / FIPS 140-2 / Key size / Information security / Password / Security / Computer security / Cryptography

NETWORK SECURITY FRAMEWORK: ROBUSTNESS STRATEGY Teri Arber, NSA Deb Cooley, NSA Steve Hirsch, NSA Martha Mahan, NSA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
968Cryptographic Module Validation Program / FIPS 140-2 / Reference / FIPS 140 / National Voluntary Laboratory Accreditation Program / Validation / National Institute of Standards and Technology / Cryptographic Module Testing Laboratory / FIPS 140-3 / Cryptography standards / Computer security / Evaluation

Title of Tutorial: Surviving the FIPS[removed]Validation Process Tom Caddy, Brenda Kallighan, Patricia Lareau, InfoGard Laboratories Inc. The Cryptographic Module Validation Program, which tests cryptographic

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
969Electronic commerce / Cryptographic protocols / Computer network security / Entrust / Public key infrastructure / X.509 / Verisign / Digital signature / Cryptography / Public-key cryptography / Key management

PKI – The Gap Between Products and Standards Panel Proposal Panel Chair: Santosh Chokani, CygnaCom Solutions Panelists: Sharon Boeyen, Entrust Patrick Cain, BBN Technologies

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
970Computer network security / Public-key cryptography / Internet standards / Email authentication / Cryptographic software / Kerberos / Password / Challenge-response authentication / Pretty Good Privacy / Cryptography / Computer security / Computing

Technologies to Support Authentication in Higher Education v5 A. Young, I.T.Institute, University of Salford P.T. Kirstein, Department of Computer Science, University College London A. Ibbetson, Computing Laboratory, Uni

Add to Reading List

Source URL: www.ukoln.ac.uk

Language: English - Date: 1998-10-01 11:42:21
UPDATE