Hardware security module

Results: 168



#Item
81Computer networking / Technology / Computer security / Blue Coat Systems / FIPS 140-2 / FIPS 140 / Proxy server / Cryptographic Module Validation Program / Packeteer / Cryptography standards / Computing / Network performance

Blue Coat® Systems ProxySG S500 Series Models: ProxySG S500-10, S500-20 Hardware Versions: [removed], [removed], [removed], [removed], [removed], [removed], [removed], [removed], [removed], [removed]FIPS Security Kit V

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-22 09:38:00
82Data privacy / Electronic commerce / Payment Card Industry Data Security Standard / Security / Technology / Information technology management / Hardware security module / Encryption / Data security / Payment systems / Computer law / Credit cards

PCI Security Standards Council point-to-point encryption program update August 29, 2011 In this statement the Council is updating stakeholders on the release of components of its program for validating point-to-point en

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2011-08-29 17:38:12
83Hardware security module / GlobalSign

Hosted HSM Services GlobalSign Cloud Key Management for Server-based PDF Signing What is an HSM? How it Works

Add to Reading List

Source URL: www.globalsign.com

Language: English - Date: 2014-03-03 11:16:12
84Computer hardware / Credit cards / Computing / Electronic commerce / Conventional PCI / Payment card industry / Hardware security module / EMV / Payment Card Industry Data Security Standard / Payment systems / Computer buses / Data privacy

Payment Card Industry (PCI) PIN Transaction Security (PTS) Device Testing and Approval Program Guide

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2014-03-07 12:11:33
85Public-key cryptography / Passphrase / FIPS 140 / Hardware security module / Key / Password / Oracle Database / Authentication / PKCS / Cryptography / Cryptography standards / Key management

Microsoft Word - OKM Security and Authentication.final.docx

Add to Reading List

Source URL: www.oracle.com

Language: English
86Credit cards / Business / Technology / Computing / Embedded systems / EMV / Payment card industry / Payment Card Industry Data Security Standard / Hardware security module / Payment systems / Electronic commerce / Data privacy

Meet The Family Payment Security Standards Meet The Family: Payment Security Standards Meet The Family

Add to Reading List

Source URL: newscience.ul.com

Language: English - Date: 2014-08-14 12:38:37
87Computer network security / Computing / IEEE 802.11 / Wireless / Wireless security / Wireless access point / Lantronix / Wi-Fi / Wireless LAN / Wireless networking / Technology / Cryptographic protocols

Build[removed]b/g Wireless Networking Into Your Products! A compact, integrated hardware and software module, WiPort® enables you to build wireless networking into virtually any electronic device with serial or Ethernet

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2014-03-07 17:49:35
88FIPS 140 / Computing / Cryptography / Cryptographic Module Testing Laboratory / Hardware security module / Cryptography standards / Computer security / FIPS 140-2

™ DiamondPak DiamondLink DiamondVPN FIPS 140-1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
89PKCS / Critical Security Parameter / HMAC / Key management / Hardware security module / Cryptography standards / Cryptography / FIPS 140

Microsoft Word - 5j - entrust_javatk_80_fip140_security_policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-19 11:03:12
90Computer network security / Security token / FIPS 140 / Hardware security module / Access control / PCI Express / Smart card / Security / Cryptography standards / Computer security

nShield Security Policy ™ CI PHE R

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-08-28 01:00:00
UPDATE