Back to Results
First PageMeta Content
Internet protocols / FIPS 140-2 / FIPS 140 / Internet Key Exchange / IPsec / Critical Security Parameter / Zeroisation / Key management / Cryptographic hash function / Cryptography / Cryptographic protocols / Cryptography standards


SCO CMW Security Policy[removed]PDF
Add to Reading List

Document Date: 2007-09-19 01:00:00


Open Document

File Size: 53,32 KB

Share Result on Facebook

Company

HP / Hewlett-Packard Corporation / EMC / Graphical User Interface / CRYPTOGRAPHIC KEY MANAGEMENT / /

Currency

pence / /

Facility

U.S. National Institute of Standards and Technology / FIPS PUB / /

IndustryTerm

cryptographic software / software module / machine-specific software drivers / user services / software cryptographic module / cryptographic algorithms / user interface and offers applications / multi-chip electronics / cryptographic services / hash algorithm / client systems / Software/firmware test / software entities / Internet Key Exchange / production-grade metal / /

Organization

Federal Communications Commission / U.S. National Institute of Standards and Technology / TCBC DAC / /

Person

Role / /

/

Position

cryptographic officer at initialization time / cryptographic officer / manager daemon / Private / officer / /

Technology

Encryption / SHA-1 algorithm / FINITE STATE MACHINE / IKE protocol / Information Technology / API / disk drive / X Window System / private key / OPERATING SYSTEM / Digital Signature / Hellman IKE protocol / validated SHA-1 hash algorithm / TCP/IP / established using the IKE protocol / /

URL

http /

SocialTag