Back to Results
First PageMeta Content
Crime prevention / National security / Public safety / Common Criteria / Protection Profile / Security Target / Information security / Password / Cryptographic Module Testing Laboratory / Security / Computer security / Evaluation


Protection Profile for Mobile Device Fundamentals Protection Profile for Mobile Device Fundamentals Version 1.1
Add to Reading List

Document Date: 2014-02-18 15:13:48


Open Document

File Size: 1,56 MB

Share Result on Facebook

City

C. Selection / /

Company

BlackBerry Microsoft Corporation / Plaintext Key Export / Industry Apple Inc. / National Information Assurance Partnership / Motorola Solutions Samsung Electronics Co. Ltd. / /

Facility

National Institute of Standards and Technology / Port Access Entity Authentication / /

IndustryTerm

wireless connectivity / Wireless Network / protected enterprise network / cryptographic services / mobile devices / system software / storage services / Voice over IP / /

Movie

D.6 / D.3 / D.7 / D.5 / D.2 / D.4 / /

Organization

National Institute of Standards and Technology / Information Assurance Directorate / U.S. Government / U.S. Government Defense Information Systems Agency / Mobility Technical Community Page / /

/

Position

General / /

Product

Microsoft Corporation Portable Audio Device / /

PublishedMedium

Security Management / /

Technology

Encryption / 7.1 EAP-TLS Protocol / TLS Protocol / WLAN / 49 TLS Protocol / Flow Control / Information Technology / VPN / smartphones / 2 Encryption / HTTPS Protocol / 2.3 Signature Algorithms / 2.4 Keyed Hash Algorithms / 2.1 Confidentiality Algorithms / Mobile Device / 2.2 Hashing Algorithms / SSL / VOIP / Bluetooth / DTLS Protocol / Mobile Devices / /

URL

http /

SocialTag