| Document Date: 2015-01-13 13:30:44 Open Document File Size: 59,43 KBShare Result on Facebook
Company Dell / AES / Proofpoint / CBC / Microsoft / / Event FDA Phase / / Facility The Proofpoint Security Library The Proofpoint Security Library / PROOFPOINT SECURITY LIBRARY / SECURE OPERATION OF THE PROOFPOINT SECURITY LIBRARY / Cryptographic Key Management The Proofpoint Security Library / Operating System Security The Proofpoint Security Library / / IndustryTerm software module / hardware-computing platform / cryptographic services / security products / crypto services / above approved cryptographic algorithms / cryptographic algorithm / / OperatingSystem UNIX / Windows XP / Solaris / XP / Linux / Microsoft Windows / Microsoft Vista / / Organization European Central Bank / / Person Type / / Position Crypto Officer / Crypto Officer Services / Role User Crypto Officer / Private / Role Crypto Officer / / Product RC2 / SHA-1 / / ProgrammingLanguage C++ / / Technology Encryption / cryptography / P-192 P-224 P-256 P-384 P-521 Secure Hashing Algorithm / FIPS-approved algorithms / UNIX / Elliptic Curve Digital Signature Algorithm / Linux / API / above approved cryptographic algorithms / private key / OPERATING SYSTEM / RSA Signature Algorithm / following algorithms / 9 2.7 CRYPTOGRAPHIC ALGORITHMS / Digital Signature Algorithm / 2.7 Cryptographic Algorithms / / URL http /
SocialTag |