XKMS

Results: 18



#Item
1Lecture Notes in Computer Science / Computing / Microsoft Research / Computer science / XKMS / Cryptography / Cypherpunks / Brian LaMacchia

Brian A. LaMacchiaNE 20th St., #246 Bellevue, WA-4931 http://www.farcaster.com/

Add to Reading List

Source URL: www.farcaster.com

Language: English - Date: 2015-02-23 21:28:14
2Identity management / Identity management systems / Cryptography standards / Cryptographic protocols / WS-Security / Security Assertion Markup Language / XKMS / WS-SecureConversation / WS-Trust / Computing / Security / Computer security

ATNICG WG/8-WP[removed]International Civil Aviation Organization AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP – EIGHTH

Add to Reading List

Source URL: www.icao.int

Language: English - Date: 2013-04-30 16:52:15
3Cryptography standards / Markup languages / Security Assertion Markup Language / XML firewall / WS-Security / SOAP / JSON / Web service / XKMS / Computing / XML / Identity management

XML GATEWAY IDENTITY GATEWAY MOBILE GATEWAY

Add to Reading List

Source URL: www.forumsys.com

Language: English - Date: 2014-01-16 22:41:57
4Cryptography standards / Markup languages / Security Assertion Markup Language / XML firewall / WS-Security / SOAP / JSON / Web service / XKMS / Computing / XML / Identity management

XML GATEWAY IDENTITY GATEWAY MOBILE GATEWAY

Add to Reading List

Source URL: www.forumsys.com

Language: English - Date: 2014-01-10 11:22:17
5Internet protocols / Internet standards / Cryptography standards / XKMS / X.509 / Delegated Path Discovery / Lightweight Directory Access Protocol / PKCS / Authentication / Cryptography / Cryptographic protocols / Public-key cryptography

7 May 7, 2003 Comments from Denis Pinkas ([removed]) on XKMS Version 2 (April 18, 2003)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-11 00:16:59
6Computer network security / XKMS / Information / Cryptographic nonce / Challenge-response authentication / Replay attack / Cryptographic protocols / Cryptography / Cyberwarfare

CHAPTER 5. SECURITY CONSIDERATIONS 34 service because the Web service only knows this secret key: nonce = time + serial number + M AC(time + serial number, secret key)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-08 21:59:19
7Cryptography standards / Key management / Computer network security / XKMS / Public key infrastructure / XML / X.509 / Verisign / S/MIME / Cryptography / Public-key cryptography / Cryptographic protocols

White Paper _______________________ XML Trust Services

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2000-11-30 12:59:10
8Computer security / Cryptographic protocols / XKMS / Transport Layer Security / Security Assertion Markup Language / Network security / Network service / Authentication / Security service / Cryptography / Computer network security / Computing

NATIONAL ENVIRONMENTAL INFORMATION EXCHANGE NETWORK

Add to Reading List

Source URL: www.exchangenetwork.net

Language: English - Date: 2005-03-16 16:00:42
9Cryptographic protocols / Internet privacy / Email authentication / Public key infrastructure / X.509 / Secure messaging / S/MIME / Public key certificate / XKMS / Cryptography / Public-key cryptography / Key management

Improving Message Security With a Self-Assembling PKI Jon Callas Chief Technical and Security Officer 28 April 2003

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 12:04:46
10Email / Computer-mediated communication / Cryptographic protocols / Spamming / Spam filtering / DomainKeys Identified Mail / S/MIME / XKMS / Internet security / Cryptography / Computing / Email authentication

Microsoft Word - Achieving Usable Security Using Existing Standards.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-02-08 10:31:52
UPDATE