Key management

Results: 16095



#Item
911

Incorporating Temporal Capabilities in Existing Key Management Schemes Mikhail J. Atallah1 , Marina Blanton2 , and Keith B. Frikken3 1 Department of Computer Science, Purdue University

Add to Reading List

Source URL: www.cse.nd.edu

Language: English - Date: 2007-08-02 16:59:38
    912Domain name system / Key management / Public-key cryptography / Public key infrastructure / Certificate authorities / Symantec / Public key certificate / Domain name / Verification and validation

    Symantec Verification Overview .BANK Verification Symantec Verification Overview for .BANK - v2 (15 Jan 2015) INTRODUCTION ...............................................................................................

    Add to Reading List

    Source URL: www.ftld.com

    Language: English - Date: 2015-01-15 11:48:19
    913

    © Springer Boston, IFIP International Federation for Information Processinghttp://www.springerlink.com/content/jgkw4x02q3507421/fulltext.pdf?page=1 Efficient Key Management for Enforcing Access Control in Outsou

    Add to Reading List

    Source URL: spdp.di.unimi.it

    Language: English - Date: 2012-12-10 09:50:06
      914Economy / Business / E-commerce / Professional studies / Customer experience management / Customer relationship management / Marketing / Mobile banking / Revenue / Bank

      TABLE OF CONTENTS FINANCIAL HIGHLIGHTS AND KEY RATIOS 2 MANAGEMENT’S REPORT

      Add to Reading List

      Source URL: investor.trifork.com

      Language: English - Date: 2012-03-30 10:51:15
      915

      Fiscal Health Risk Analysis Key Fiscal Indicators for K-12 Districts The Fiscal Crisis and Management Assistance Team (FCMAT) has developed the Fiscal Health Risk Analysis as a management tool to evaluate key fiscal indi

      Add to Reading List

      Source URL: fcmat.org

      Language: English - Date: 2015-04-06 13:14:31
        916

        Improving the ISO/IECstandard for key management techniques Cas Cremers, Marko Horvat University of Oxford, UK 16 December 2014

        Add to Reading List

        Source URL: ssr2015.com

        Language: English - Date: 2015-06-22 06:35:35
          917Records management technology / Signature / Biometrics / Digital signature / Public-key cryptography

          Texas A&M University at Qatar

          Add to Reading List

          Source URL: www.qatar.tamu.edu

          Language: English - Date: 2015-10-15 04:34:38
          918Cryptography / Public-key cryptography / Key management / Public key infrastructure / Blog / Authentication / Key

          Schematizing Trust in Named Data Networking Yingdi Yu1, Alex Afanasyev1, David Clark2, kc claffy3, Van Jacobson1, Lixia Zhang1! ! 1. UCLA 2. MIT 3. CAIDA!

          Add to Reading List

          Source URL: conferences2.sigcomm.org

          Language: English - Date: 2015-10-03 14:16:59
          919Software / Computing / Technology / E-commerce / Mobile application management / Mobile app / App store / Google Play / Microsoft App-V / Bring your own device / Remote mobile virtualization / Google Apps Marketplace

          App47 for the Mobile Enterprise App47’s Key Benefits Customizable Enterprise App Store Securely deploy public and private apps via your own company branded app store

          Add to Reading List

          Source URL: www.app47.com

          Language: English - Date: 2013-06-07 13:35:11
          920Cryptography / Public-key cryptography / Public key infrastructure / Transport Layer Security / Key management / Cryptographic protocols / Public key certificate / X.509 / HTTPS / OpenSSL / Revocation list

          Secure Abstraction with Code Capabilities Robbert van Renesse∗ , H˚avard D. Johansen† , Nihar Naigaonkar∗ , and Dag Johansen† ∗ Cornell University, USA † University of Tromsø, Norway Abstract—We propose

          Add to Reading List

          Source URL: www.cs.cornell.edu

          Language: English - Date: 2012-11-08 10:00:02
          UPDATE