Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

Digital Signature Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DSS (Digital Signature Standards)
DEFINITION: Digital Signature Standard (DSS) is the digital signature algorithm (DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authentication of electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents.  … 
Definition continues below.
Digital Signature Standards Reports
101 - 125 of 433 Matches Previous Page  |  Next Page
Dell Data Protection Infographic
sponsored by Dell, Inc. and Intel®
DATA SHEET: This infographic details how Dell technology allows you keep systems and data protected, even for those systems that are missing. Learn how it continuously monitors the security state of all systems and how if a system detects an attempted attack, encryption keys can be automatically destroyed so your information can't be stolen.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Dell, Inc. and Intel®

Demystifying Industry Standards
sponsored by IBM
EBOOK: Access the following e-book to learn how industry standards are affecting the way businesses work, how to alleviate many of the complexities associated with them, and how to successfully tackle the initiative as a whole.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

IBM

Detecting the use of TrueCrypt
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Device and Data Protection - Part 1
sponsored by Dell, Inc. and Intel®
WEBCAST: Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Device and Data Protection - Part 2
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Dynamic Multipoint Virtual Private Network (DMVPN)
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn different approaches to network design with DMVPN.
Posted: 21 May 2015 | Published: 30 Apr 2015

Global Knowledge

E-commerce 101: A Guide to Successful Selling on the Web
sponsored by GeoTrust, Inc.
WHITE PAPER: In this informative white paper, get help setting up, securing, and promoting your e-commerce site as you uncover the basics of e-commerce and learn how to avoid the pitfalls that can distress even the savviest of planners.
Posted: 11 Dec 2012 | Published: 30 Dec 2011

GeoTrust, Inc.

Delivering corporate data securely on employee iPads™
sponsored by Citrix
WHITE PAPER: This white paper provides detailed insight into the latest iPad adoption trends and examines the issues that often accompany these devices from an IT perspective. Find out how the iPad differs from a traditional PC with respect to security and obtain helpful recommendations to help you balance user preferences with security and control.
Posted: 10 Jan 2012 | Published: 10 Jan 2012

Citrix

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Deploying a Wireless LAN
sponsored by BlackBerry
WHITE PAPER: Many factors must be considered when planning for a WLAN deployment. This paper provides a starting point for posing questions to WLAN equipment and service vendors.
Posted: 18 May 2007 | Published: 01 May 2007

BlackBerry

Detect and Survive
sponsored by Guidance Software, Inc.
WHITE PAPER: This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

Digital Certificates and the Apache Web Server
sponsored by Thawte Inc.
WHITE PAPER: This guide offers support on how to test, purchase, install, and use digital certificates for SSL connections on your Apache web server. View now to learn more.
Posted: 07 May 2013 | Published: 07 May 2013

Thawte Inc.

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Disable Lost PCs and Data Remotely
sponsored by Intel
VIDEO: Learn how the all new 2010 Intel® Core™ vPro™ processor family can help by disabling lost or stolen PCs via a poison pill, and how they can be easily reactivated via server-generated passwords thanks to Intel® Anti-Theft Technology and WinMagic.
Posted: 27 Apr 2010 | Premiered: 22 Jan 2010

Intel

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention
sponsored by Trend Micro, Inc.
CASE STUDY: When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

E-Book: Data loss prevention strategies, practices and tools
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Data loss prevention strategies, practices and tools are more important than ever. Read this e-book for expert advice on DLP, encryption, risk management and more.
Posted: 18 Nov 2009 | Published: 18 Nov 2009

SearchSecurity.com & SearchCompliance.com

E-Book: Data Protection Plans for Complying with Privacy Laws
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
Posted: 21 Oct 2010 | Published: 21 Oct 2010

SearchSecurity.com & SearchCompliance.com

E-Book: New Rules for HIPAA
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

SearchSecurity.com & SearchCompliance.com

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

E-Book: The Dark Side of Cloud Computing
sponsored by Astaro
EBOOK: Ask who controls the most powerful computing cloud in operation and Amazon EC2 or one of their competitors springs to mind. However there are other cloud computers which exist today that can directly challenge their might. Botnets and their creators represent a darker side of the Internet where money is a powerful motivator for creativity.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Astaro

E-guide-- Endpoint security suites: What to consider before renewal
sponsored by ESET
EGUIDE: In this expert e-guide, get tips on what you should consider before choosing, keeping, or upgrading your endpoint security software. Review endpoint security suite management issues, as well as how to negotiate with vendors.
Posted: 13 Jan 2010 | Published: 13 Jan 2010

ESET

E-Guide: Best Practices for Securing Your Network
sponsored by Dell, Inc.
EGUIDE: This expert e-guide explains how to effectively secure your network with a practical defense-in-depth approach to security. You’ll also find the critical elements all organizations must review as they consider SaaS products.
Posted: 26 May 2011 | Published: 26 May 2011

Dell, Inc.

E-Guide: Expert guide to Access Management Services in the Cloud
sponsored by Intel
EGUIDE: This expert tip takes a look at the steps you can take to utilize cloud services as they become more mainstream and highlights two key architectural and process components of access management services that must be considered in the cloud.
Posted: 26 May 2011 | Published: 26 May 2011

Intel
101 - 125 of 433 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DIGITAL SIGNATURE STANDARDS DEFINITION (continued): …  DSS is specified in Federal Information Processing Standard (FIPS) 186.DSA is a pair of large numbers that are computed according to the specified algorithm within parameters that enable the authentication of the signatory, and as a consequence, the integrity of the data attached. Digital signatures are generated through DSA, as well as verified. Signatures are generated in conjunction with the use of a private key; verification takes place in reference to a corresponding public key. Each signatory has their own paired public (assumed to be known to the general public) and private (known … 
Digital Signature Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement