Back to Results
First PageMeta Content
Key management / EMC Corporation / Electronic commerce / RSA / PKCS / Key size / Digital signature / Index of cryptography articles / Network Security Services / Cryptography / Public-key cryptography / Cryptography standards


Ciphertext Volume 4, No. 1 RSA DATA SECURITY, INC.
Add to Reading List

Document Date: 2000-03-07 12:00:00


Open Document

File Size: 662,15 KB

Share Result on Facebook

City

Cincinnati / San Francisco / REDWOOD CITY / Wollongong / Atlanta / Dallas / Tokyo / Menlo Park / Beijing / U I T / /

Company

Nihon RSA / TGV Inc. / Page 7 RSA Establishes New Pacific Rim Ventures / Trusted Information Systems Inc. / VeriSign Inc. / Novell / SAIC / Visa International / introducRSA Data Security Inc. / Netscape Communications Corp. / Intuit / IBM Corporation / BSAFE inRSA Data Security Inc. / FTP Software / Gemini Computers Inc. / Virtual Private Networks / RSA DATA SECURITY INC. / Sun Microsystems / Oracle / Asian Pacific Ventures Co. / RSA Laboratories / Sciences Graduate School’s Laboratory / U.S. POSTAGE PAID MMS INC. / Microsoft / Secure Computing Corporation / RSA Pacific Rim Ventures / TimeStep Corporation / availRSA Data Security Inc. / MasterCard International / BUG / GTE / NTT / CheckPoint Software Technologies Ltd. / Mitsubishi / Raptor Systems Inc. / MOFTEC / MedPlus Inc. / RSA Labs / Page 5 T H E R S A / Triple-DES / Consumers RSA Laboratories / Netrend Corporation / interLotus / Intel / /

Country

China / Japan / Taiwan / United States / /

/

Event

FDA Phase / Person Travel / Employment Change / M&A / /

Facility

Laboratory of Information Security / Building Secure Applications / building SET / Computer Security Institute / Institute of Standards / Washington / D.C. Renaissance Hotel / RSA Art Gallery / Digital Internet Tunnel / Sciences Graduate School’s Laboratory of Information Security / /

IndustryTerm

cryptographic technology / creditcard payment applications / stack products / authentication services / identical technology / publickey enabled solutions / software developers / Internet E-mail packages / exportable applications / encryption uspurpose crypto hardware / stack tools / Internet PEM privacy / cryptographic algorithms / applicationspecific tool / Internet Protocol / e - commerce / crypto applications / encryption technology / retrieval systems / Internet Expo / security protocol / Internet-based Virtual / Web browsers / higher-level protocols / Internet World / security technology / security products / keynote address / electronic commerce solutions / Internet Tunnel / cryptography protocols / Internet Security Conference / authentication protocols / export law / video ing applications / hardware products / computer network / application-specific tools / authentication technology / government algorithms / encryption technologies / software application / security solutions / messagwidth applications / cryptography technology / access to proven and tested algorithms / security middleware product / data encryption technology / remote computing / Online Art Gallery / electronic commerce share / liver state-of-the-art security solutions / electronic commerce / /

OperatingSystem

Microsoft Windows / Novell Netware / /

Organization

US Department of Commerce / Internet Engineering Task Force / Clinton administration / Laboratory of Information Security / Computer Security Institute Chicago / Economic Cooperation / U.S. military / Chinese government / US Department of State / Institute of Standards and Technology / Chinese Academy / Ministry of Foreign Trade and Economic Cooperation / Computing Center / Ministry of Foreign Trade / M.I.T / Graduate School / World Congress / /

Person

James Bidzos / Yanping Hu / Kathy Kincaid / Ron Rivest / Stratton Sclavos / Mike Homer / Zhanseng Zhao / E. Andrew Mayo / Jim Bidzos / /

/

Position

coding and electronic records specialist for the health care industry / vice president / physician / Professor / president and chief executive officer / representative / accomplished and respected researcher / director of I/T Security Programs / consultant / Deputy Director General / undisputed leader / president / president and CEO / chairman / exclusive representative / executive vice president / Deputy Director General of computing center / /

Product

ChartMaxx-WebLink(TM) / LOCT Architecture / ChartMaxx-WebLink / /

ProgrammingLanguage

SQL / DC / T / /

ProvinceOrState

California / /

PublishedMedium

the National / the RSA Laboratories Bulletin / The Bulletin / /

Region

Pacific Rim / /

Technology

2.0 Encrypt Protocol / API / Block Cipher / DES algorithm / encryption / data encryption technology / authentication protocols / Digital Signature authentication technology / Digital Signature / government algorithms / Alpha / identical technology / S/MIME / MAC algorithms / IP / will nature Algorithm / data encryption / DSA algorithms / TCP/IP / security protocol / encryption technologies / firewall / HTTP / higher-level protocols / interoperable privacymance RC5 algorithm / WAN / cryptography / encryption technology / security technology / expanded algorithm / SSL / TCP/ IP / cryptography protocols / cryptography technology / public key / also be implemented using the government’s older DES algorithm / /

URL

http /

SocialTag