Key signature

Results: 1754



#Item
41Cryptography / Public-key cryptography / Secure communication / Financial cryptography / Cryptographic protocols / Privacy-enhancing technologies / Digital signature / Proxy server / Internet privacy / Anonymity / Enhanced privacy ID / Pseudonymity

Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:14
42Cryptography / Cryptographic hash functions / Public-key cryptography / Error detection and correction / Hash function / Digital signature / Parameter / SECG / SHA-2

Elliptic Curve Abe-Okamoto-Suzuki Message Recovery Signature Scheme (ECAOS) Working DraftAugust 25,

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
43Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Electronic documents / SAFE-BioPharma Association / Certificate authority / Digital signature / Public key certificate / Professional certification

TeleTrusT – Bundesverband IT-Sicherheit e.V. Der IT-Sicherheitsverband. PRESS RELEASE Transatlantic Alliance:

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-05-23 10:15:15
44Cryptography / Public-key cryptography / Blind signature / Digital signature / Transmission Control Protocol

United States Patent] Chaum

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:23
45Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Cryptography standards / X.509 / Internet Standards / PKCS / Code signing / Portable Executable / Public key certificate / Cryptographic Message Syntax

Windows Authenticode Portable Executable Signature Format Version 1.0 — March 21, 2008  Abstract Authenticode® is a digital signature format that is used to determine the origin and integrity of software binaries. A

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-07-29 12:01:34
46Cryptography / Public-key cryptography / Public key infrastructure / Key management / E-commerce / Group signature / Trusted Computing / Certificate authority / Anonymity / Digital signature / Public key certificate / Direct Anonymous Attestation

figures/spendorsementRATE.eps

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
47Cryptography / Public-key cryptography / XTR / Digital signature / IP / Undeniable signature / Draft:Provably Secure Ring-LWE Signature

LNCSWallet Databases with Observers

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:06:15
48Cryptography standards / Computer law / Signature / E-commerce / Regulation / EIDAS / Public key certificate / Electronic signature / Authentication / Trust service provider / Draft:Test Qualified digital certificate

European Regulation on Electronic Título de presentación Identification and Trust Services Raúl Rubio Nombre Baker

Add to Reading List

Source URL: www.observatoriotui.com

Language: English
49Public-key cryptography / Notary / Elliptic curve cryptography / Randomness / Finite fields / Radio-frequency identification / Authentication protocol / Physical unclonable function / Authentication / Digital signature / Quantum readout of PUFs / Types of physical unclonable function

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-08-29 03:45:16
50Computer access control / Identity management / Federated identity / Security token / Mobile signature / Password / Authentication / Public key infrastructure / Multi-factor authentication / Mobile identity management / OpenID / Subscriber identity module

Keyhub_Technical_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-13 04:56:07
UPDATE