Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

Digital Signature Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DSS (Digital Signature Standards)
DEFINITION: Digital Signature Standard (DSS) is the digital signature algorithm (DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authentication of electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents.  … 
Definition continues below.
Digital Signature Standards White Papers (View All Report Types)
26 - 50 of 281 Matches Previous Page  |  Next Page
An End-to-End Framework For Mobile Security
sponsored by BlackBerry
WHITE PAPER: Discover how to secure corporate data on the cloud in a BYOD environment. Learn not only about the changing landscape of mobile security, but also the growing trends that make securing enterprise data on these devices more vital than ever.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

BlackBerry

Application Awareness: The Critical Enabler in Virtualized Networks
sponsored by Ipoque
WHITE PAPER: Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.
Posted: 17 May 2016 | Published: 29 Apr 2016

Ipoque

Applying Data Science to User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Discover how to reduce false positives for User and Entity Behavior Analytics (UEBA) and use machine learning to derive network context. Access this whitepaper now to learn proven techniques from real customer deployments.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Exabeam

Are you fully secure? Or are you still using weak authentication methods?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you the top 5 ways organizations are using SecurID Access to improve secure sign-ons.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Assessing and Sharpening your Security Controls
sponsored by eTECH Channel
WHITE PAPER: Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

eTECH Channel

Attacks through HTTPS can be a vulnerability for enterprises
sponsored by Blue Coat Systems
WHITE PAPER: This white paper helps you identify hidden threats to your business and what sort of encryption your network might need.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Blue Coat Systems

AWS Cautionary Tales and How to Avoid Becoming One
sponsored by Palerra Inc.
WHITE PAPER: AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Palerra Inc.

Beyond the Balance Sheet: Assessing the Impact of the New Lease Accounting Standard
sponsored by IBM
WHITE PAPER: This white paper will help CFOs prepare for the 2015 FASB and IASB changes, which will eliminate all operating leases from the income statement and move them onto the balance sheet as a capital expense.
Posted: 02 Nov 2012 | Published: 31 Jan 2012

IBM

Bloor: For the EU's New Data Protection Regulation, Encryption Should Be the Default
sponsored by Vormetric
WHITE PAPER: This report by Bloor Research discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data. Discover how you can make it part of a comprehensive, consistent data security strategy.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Bolster email security in Office 365 deployments
sponsored by ZixCorp
WHITE PAPER: Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. Learn why email encryption capabilities should not be overlooked in those plans.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

Bullet-proofing Office 365 Email
sponsored by LogicNow
WHITE PAPER: Learn the importance of protecting your Office 365's cloud-based email system. Uncover how to utilize the CIA triad (confidentiality, integrity, availability), how to build a broader defense strategy, the benefits of "bullet-proofing" your email, and more.
Posted: 23 Aug 2016 | Published: 31 Dec 2015

LogicNow

BYOD Mobile Device Management
sponsored by IBM MaaS360
WHITE PAPER: Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM MaaS360

Can a CASB Protect You from the 2016 Treacherous 12?
sponsored by Palerra Inc.
WHITE PAPER: Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

Case Study: Enable Care Providers While Protecting Patient Data
sponsored by Digital Guardian
WHITE PAPER: Follow St. Charles Health System's path from risk assessment to remediation of their problems using a data loss prevention technique to monitor their entire network to ensure no important information was being mishandled.
Posted: 06 May 2016 | Published: 01 Apr 2016

Digital Guardian

Advantages of Amanda over Proprietary Backup
sponsored by Zmanda Inc.
WHITE PAPER: This white paper discusses how Amanda compares to other backup products. It will help you understand some key Amanda differences and how to evaluate and transition to Amanda.
Posted: 09 Jul 2008 | Published: 08 Jul 2008

Zmanda Inc.

Airport Insecurity: The Case of Lost Laptops
sponsored by Dell India
WHITE PAPER: This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers.
Posted: 15 Jan 2010 | Published: 30 Jun 2008

Dell India

Aligning Security to Provide the Anticipated Business Results
sponsored by AT&T Corp
WHITE PAPER: This resource looks at some of the more important questions IT managers should consider when implementing a security solutions strategy.
Posted: 21 Sep 2011 | Published: 21 Sep 2011

AT&T Corp

Archive Security in a Tiered Storage Environment
sponsored by Plasmon
WHITE PAPER: Find out how to identify potential security risks and review various storage technologies and business operations that balance the security requirements of long term archiving with overall cost and operation of the archive.
Posted: 06 Sep 2006 | Published: 24 Aug 2006

Plasmon

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER: Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

Choose Your Next SOA Implementation Step Carefully
sponsored by Seros
WHITE PAPER: This white paper discusses the critical role of an ESB and an open standards-based reference architecture in a successful SOA initiative.
Posted: 25 Jun 2008 | Published: 25 Jun 2008

Seros

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by VeriSign Australia
WHITE PAPER: This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia
26 - 50 of 281 Matches Previous Page    1 2 3 4 5    Next Page
 
DIGITAL SIGNATURE STANDARDS DEFINITION (continued): …  DSS is specified in Federal Information Processing Standard (FIPS) 186.DSA is a pair of large numbers that are computed according to the specified algorithm within parameters that enable the authentication of the signatory, and as a consequence, the integrity of the data attached. Digital signatures are generated through DSA, as well as verified. Signatures are generated in conjunction with the use of a private key; verification takes place in reference to a corresponding public key. Each signatory has their own paired public (assumed to be known to the general public) and private (known … 
Digital Signature Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement