Back to Results
First PageMeta Content
Computer security / Crime prevention / National security / Computer crimes / Key management / National Strategy for Trusted Identities in Cyberspace / United States Department of Homeland Security / Identity management system / Cyberspace / Security / Public safety / Computer network security


[removed]NTIA-SYN-CIIE-Comments
Add to Reading List

Document Date: 2010-10-04 11:36:21


Open Document

File Size: 573,54 KB

Share Result on Facebook

City

NITRD / Gozo / NSTIC / New Oxford / STORK / bringing together the U.S. NITRD / /

Company

U.S. NIST CKM Project / Synaptic Labs / Benjamin Gittins Chief Technical Officer Synaptic Laboratories Limited / Voltage Security / National Telecommunications / IBM / org/ Synaptic Laboratories Limited / Privacy-Enhancing Technologies / Synaptic Laboratories Ltd. / Oak Ridge National Laboratory / Participants Ideas Report 2 Specifically Synaptic Labs / Private Technology Company / Designing Cryptographic Key Management Systems / Cyber Physical Systems / /

Continent

Europe / /

Country

France / Australia / Malta / China / Russia / United States / /

Currency

SLL / /

/

Event

M&A / /

Facility

Building Scalable Secure Systems / US National Institute of Standards / National Institute of Standards and Technology / University of Auckland / /

/

IndustryTerm

cryptographic key management / limited revelation identity systems / assurance trustworthy global-scale identity management / dependable infrastructure / public key infrastructure / trustworthy solution / Internet Economy Notice / trustworthy global-scale identity management / civilian public key infrastructure / large online commercial store / Internet Economy No / failsafe communications environment / Internet Security / communications infrastructure / Internet Economy It / Internet Economy / quantum computing / security solutions / web-page / Internet Economy In consideration / identity management / Internet Economy In / cybersecurity systems / Internet Economy We / trustworthy systems / identity management systems / cryptographic systems / game-changing technologies / unwanted processing / quantum computing-resistant algorithms / /

OperatingSystem

Microsoft Windows / Mac OS X / Linux / /

Organization

U.S. Department of Commerce / U.S. Government / Electronic Freedom Foundation / National Telecommunications and Information Administration / Synaptic Lab / National Institute of Standards and Technology / European Union / United States Government Accountability Office / Information Society / INFOSEC Research Council / U.S. Department of Homeland Security / U.S. Government Accountability Office / US State Department / Central Command / NIST’s SP / SecurIST Advisory Board / White House / Department of Computer Science / US National Institute of Standards and Technologies / University of Auckland / European Information Society / /

Person

Ben Gittins / Sally E. Howe / Charles de Secondat / Luther Martin / Benjamin Gittins / Elaine Barker / Richard Brooks / Peter Gutmann / Jeff Jonas / Claudine Guérin de Tencin / Schneier Ten / /

/

Position

project leader / cto / representative data sets / Chief Technical Officer / U.S. President / representative / Chief Security Architect / associate director / /

PublishedMedium

The American Political Science Review / the Information Society / /

Region

British America / /

Technology

Linux / game-changing technologies / PKI / operating system / html / cryptography / quantum computing-resistant algorithms / public key infrastructure / operating systems / 5.3 Progress Technologies / pdf / cellular telephone / public key / http / /

URL

http /

SocialTag