Key management

Results: 16095



#Item
881

Key Issue 3 Better Use of Resources Management Approach Recognition of Challenges

Add to Reading List

Source URL: www.aeon.info

Language: English - Date: 2016-03-25 04:42:26
    882Cryptography / Internet / Computing / Domain name system / Internet Standards / Internet protocols / Key management / Public-key cryptography / Domain Name System Security Extensions / Certificate authority / Name server / Comparison of DNS server software

    DNSSEC in NL final report R. Gieben version: 1.1.0

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2009-06-27 06:06:49
    883

    Key Issue 1 Realization of a Low-carbon Society Management Approach Progress of KPI of FY2014

    Add to Reading List

    Source URL: www.aeon.info

    Language: English - Date: 2015-10-21 12:16:25
      884Computing / Internet / Software / Internet Standards / Internet protocols / Domain name system / Key management / Public-key cryptography / Domain Name System Security Extensions / Unbound / Installation / Start menu

      Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, October 2010 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

      Add to Reading List

      Source URL: www.unbound.net

      Language: English - Date: 2010-11-08 06:57:17
      885

      Efficient Multi-Dimensional Key Management in Broadcast Services⋆ Marina Blanton1 and Keith B. Frikken2 1 Department of Computer Science and Engineering, University of Notre Dame

      Add to Reading List

      Source URL: www.cse.nd.edu

      Language: English - Date: 2010-07-07 13:21:45
        886Information technology / Computing / Information / Data management / Business intelligence / Qlik / Teradata / Big data / Data discovery / Analytics / Data visualization / Data analysis

        Gaining value from big data Big data has less to do with size and more to do with the growing recognition by individuals, groups, and organizations that data and analysis can improve key business decisions. Businesses ar

        Add to Reading List

        Source URL: www.ciosummits.com

        Language: English - Date: 2015-10-06 16:27:31
        887Key management / Public key infrastructure / E-commerce / Transport Layer Security / Secure communication / CA/Browser Forum / Extended Validation Certificate / HTTPS / Public key certificate / Gmail / Certificate authority / Encryption

        Browser Interfaces and Extended Validation SSL Cer tificates: An Empirical Study Robert Biddle, P.C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen Carleton University, Ottawa, ON, Canada

        Add to Reading List

        Source URL: digitalpiglet.org

        Language: English - Date: 2009-11-27 08:29:52
        888

        Fiorano ESB® Enterprise Service Bus Rapid Integration Across the Enterprise Key Benefits Distributed, dynamic service deployment and management

        Add to Reading List

        Source URL: www.fiorano.com

        Language: English - Date: 2015-07-08 05:40:27
          889Security / Cryptography / Prevention / Identity management / Public-key cryptography / Computer networking / Content centric networking / Access control / IBAC / Encryption

          Interest-Based Access Control in CCN Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood Department of Computer Science University of California Irvine

          Add to Reading List

          Source URL: conferences2.sigcomm.org

          Language: English - Date: 2015-10-03 12:09:18
          890

          Key Management Interoperability Protocol Specification Version 1.2 OASIS Standard 19 May 2015 Specification URIs This version:

          Add to Reading List

          Source URL: docs.oasis-open.org

          Language: English - Date: 2015-05-19 12:00:00
            UPDATE