Hardware security module

Results: 168



#Item
31Machine-to-Machine / Computer network security / M2M / Security service / SMS / Hardware security module / Telit / SIMCom / Technology / Mobile technology / Communication

DOC Document

Add to Reading List

Source URL: onem2m.org

Language: English - Date: 2014-09-26 06:22:04
32HOTP / Cryptographic protocols / Hardware security module / PKCS / SecurID / Key Management Interoperability Protocol / One-time password / X Window System / PKCS11 / Cryptography / Internet protocols / Cryptography standards

Key Management SDKs Complete vendor-independent key management solution 01010101100100101101001101110010101011010101010 KEY MANAGEMENT

Add to Reading List

Source URL: www.cryptsoft.com

Language: English - Date: 2015-04-27 12:14:08
33Espionage / FIPS 140-2 / Hardware security module / FIPS 140 / Tamper resistance / Technology / Cryptographic engineering / IBM / Cryptography standards / Cryptography / Computer security

V-OS Secure Mobile Middleware KEY BENEFITS What Delivering a solid security foundation for enterprise mobile applications.

Add to Reading List

Source URL: www.v-key.com

Language: English - Date: 2013-07-28 12:12:01
34Public-key cryptography / Cryptographic software / PKCS11 / Electronic commerce / PKCS / Hardware security module / OpenSSL / OpenSC / Security token / Cryptography / Cryptography standards / Smart cards

An introduction to the use of HSM

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:51
35Internet protocols / Computing / Network architecture / DNSSEC / Domain Name System Security Extensions / Key Ceremony / ICANN / Hardware security module / Internet / Domain name system / Key management

  Internet  Corporation  for  Assigned  Names  and  Numbers   Root DNSSEC KSK Ceremony 21 Thursday April 9, 2015

Add to Reading List

Source URL: data.iana.org

Language: English - Date: 2015-04-03 14:09:06
36Public-key cryptography / Cryptographic protocols / Cryptography standards / Hardware security module / Microsoft CryptoAPI / PKCS / Transport Layer Security / Key generation / Key Wrap / Cryptography / Cryptographic software / Key management

A Linux kernel cryptographic framework: Decoupling cryptographic keys from applications Nikos Mavrogiannopoulos COSIC/ESAT – IBBT Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
37Public-key cryptography / Cryptographic software / PKCS11 / Electronic commerce / PKCS / Hardware security module / OpenSSL / OpenSC / Security token / Cryptography / Cryptography standards / Smart cards

An introduction to the use of HSM

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:51
38Technology / Payment systems / Finance / Espionage / Hardware security module / Smart cards / Magnetic stripe card / MasterCard / Contactless smart card / ISO standards / Ubiquitous computing / EMV

Simplify the complexity of EMV data preparation Prime Factors makes legacy-system EMV data preparation as easy and familiar as magnetic stripe is today. Now you can control your most sensitive and proprietary information

Add to Reading List

Source URL: primefactors.com

Language: English - Date: 2013-05-09 18:04:22
39Domain name system / Key management / Computer security / DNS root zone / Hardware security module / Domain Name System Security Extensions / ICANN / Verisign / Key Ceremony / Cryptography / Security / Internet

The Internet Corporation for Assigned Names and Numbers SERVICE ORGANIZATION CONTROL 3 (SOC3) Report on Internet Corporation for Assigned Names and Numbers (“ICANN”)’s Assertion of the Suitability of Design and Ope

Add to Reading List

Source URL: cert.webtrust.org

Language: English - Date: 2015-03-27 12:44:37
40EMV / Technology / Smart card / Magnetic stripe card / Hardware security module / ISO standards / Ubiquitous computing

prime_factors_diagram_NEW

Add to Reading List

Source URL: www.primefactors.com

Language: English - Date: 2013-04-10 17:16:39
UPDATE