Public-key cryptography

Results: 11378



#Item
651Cryptography / Cryptography standards / Signature / Computer law / E-commerce / Regulation / Public key certificate / Electronic signature / Electronic Signatures Directive / Advanced electronic signature / Professional certification / European Union law

LEN Official Journal of the European Communities

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2005-09-27 11:15:24
652Cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography

Certificate of Stay - Study This is to confirm that

Add to Reading List

Source URL: www.studyinflanders.be

Language: English
653Legal documents / Contract law / Key management / Public key infrastructure / Public-key cryptography / Invoice / Professional certification / Public key certificate / Consignee

TRANSACTION CERTIFICATE (TC) FOR TEXTILES PROCESSED ACCORDING TO THE GLOBAL ORGANIC TEXTILE STANDARD (GOTS) 1. Body issuing the certificate (name and address) 2a) licensing code of the certification body

Add to Reading List

Source URL: www.global-standard.org

Language: English - Date: 2015-10-26 13:15:06
654Algebraic curves / Elliptic curve cryptography / Public-key cryptography / Finite fields / Algebraic surfaces / Elliptic curve / Abelian variety / Curve

Cover and Decomposition Attacks on Elliptic Curves Vanessa VITSE Joint work with Antoine JOUX Universit´ e de Versailles Saint-Quentin, Laboratoire PRiSM

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:06
655Cryptography / Key management / Public key infrastructure / Transport Layer Security / Public-key cryptography / Certificate authority / Public key certificate / Root certificate / Extended Validation Certificate / X.509 / Online Certificate Status Protocol / Self-signed certificate

Accountable Key Infrastructure (AKI): ∗ A Proposal for a Public-Key Validation Infrastructure Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2016-03-11 00:44:59
656Cryptography / Income tax in India / Permanent account number / Types of business entity / Business law / Public key certificate / Tax / Sole proprietorship / Authentication / Indian tax forms

Annexure 1 - Declaration for HUF & Proprietorship Firm Date: _____________ The Manager The Royal Bank of Scotland N.V.

Add to Reading List

Source URL: www.rbs.in

Language: English - Date: 2015-08-11 06:57:43
657Cryptography / Signature / Records management technology / Computer law / E-commerce / Key management / Electronic signature / Digital signature / Records management / Public key certificate / Authentication / Uniform Electronic Transactions Act

ISSN035X THE UNITED REPUBLIC OF TANZANIA BILL SUPPLEMENT 20th February, 2015

Add to Reading List

Source URL: parliament.go.tz

Language: English - Date: 2015-11-09 09:07:10
658Cryptography / Cryptographic software / Key management / Internet security / Transport Layer Security / GNU Privacy Guard / OpenSSL / Key server / Key / Public-key cryptography / Heartbleed / Common Vulnerabilities and Exposures

Crypto year in review Sept 2014 Bill Ricker for BLU.org Size matters *Current recommended key sizes.*

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2014-10-02 16:10:38
659Cryptography / Computing / Security / E-commerce / Secure communication / Crime prevention / National security / DMARC / Public key certificate / Sunrise period / Medical privacy / Domain name

GENERAL CONTROLS SUPPORTING THE DOMAIN NAME REGISTRATION SERVICES SOC 3 Audit Report Independent Service Auditor’s Report on Controls Placed in Operation

Add to Reading List

Source URL: www.encirca.com

Language: English - Date: 2016-04-14 14:46:28
660Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 22:04:37
UPDATE