Hardware security module

Results: 168



#Item
41Espionage / Computer security / Payment Card Industry Data Security Standard / Security / Transparent Data Encryption / Vormetric / Cryptography / Hardware security module / Tokenization

1124_prime_factors_diagram_v2

Add to Reading List

Source URL: www.primefactors.com

Language: English - Date: 2013-09-18 16:50:43
42Symmetric-key algorithm / Key / Encryption / Cipher / Hardware security module / Advanced Encryption Standard / Key Wrap / Encrypting File System / Cryptography / Key management / Public-key cryptography

Guide to Data Field Encryption Contents Introduction 2

Add to Reading List

Source URL: www.visa-asia.com

Language: English - Date: 2013-09-06 08:42:22
43Hardware security module

HSM Surveyor™ Take the Guesswork Out of HSM Monitoring Hardware Security Modules (HSMs) are an essential but expensive component in encryption and key management for enterprises. Because of

Add to Reading List

Source URL: www.primefactors.com

Language: English - Date: 2015-02-12 17:15:51
    44EMV / ISO standards / Ubiquitous computing / Public-key cryptography / Smart card / Hardware security module / Credit card / Payment card / Automated teller machine / Cryptography / Technology / Payment systems

    White Paper EMV Key Management – Explained EMV Key Management

    Add to Reading List

    Source URL: www.cryptomathic.com

    Language: English - Date: 2013-03-25 07:55:19
    45Domain name system / Key management / Internet standards / Public-key cryptography / Domain Name System Security Extensions / TSIG / Secure64 Software / DNS spoofing / Hardware security module / Cryptography / Internet / Internet protocols

    DATA SHEET Secure64® DNS Signer™ DNSSEC made simple and secure.

    Add to Reading List

    Source URL: www.secure64.com

    Language: English - Date: 2013-11-04 13:11:25
    46PKCS11 / PKCS / Dynamic-link library / Hardware security module / X.509 / Security token / Data security / Library / RSA / Cryptography / Cryptography standards / Public-key cryptography

    Ingenieurbüro David Fischer AG | A Company of the Apica Group http://www.proxy-sniffer.com Using PKCS#11 Security Devices for Recording Web Surfing Sessions and for Executing Web Load Tests

    Add to Reading List

    Source URL: www.proxy-sniffer.com

    Language: English - Date: 2014-06-09 10:00:45
    47Public-key cryptography / Key management / Safenet / Hardware security module / Symmetric-key algorithm / Key generation / Vormetric / Pretty Good Privacy / Cryptography / Disk encryption / Cryptographic software

    SafeNet KeySecure™ PRODUCT BRIEF Enterprise Key Management

    Add to Reading List

    Source URL: www.edvancesecurity.com

    Language: English - Date: 2013-06-27 09:42:19
    48Key management / Authenticator / Hardware security module / Key / Smart card / Authentication / Cryptography / Security / Cryptomathic

    KMS Case Study - MasterCard Key Generation  Revocation 

    Add to Reading List

    Source URL: www.cryptomathic.com

    Language: English - Date: 2013-03-25 07:56:26
    49Credit cards / Business / Technology / Computing / Embedded systems / EMV / Payment card industry / Payment Card Industry Data Security Standard / Hardware security module / Payment systems / Electronic commerce / Data privacy

    Meet The Family Payment Security Standards Meet The Family: Payment Security Standards Meet The Family

    Add to Reading List

    Source URL: newscience.ul.com

    Language: English - Date: 2015-03-04 15:29:38
    50Internet protocols / Internet in Australia / Internet standards / AusRegistry / Domain Name System Security Extensions / .au Domain Administration / .au / Hardware security module / DNS zone / Internet / Domain name system / Network architecture

    Microsoft Word - auda[removed]

    Add to Reading List

    Source URL: www.auda.org.au

    Language: English - Date: 2014-11-20 19:38:12
    UPDATE