Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

Digital Signature Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DSS (Digital Signature Standards)
DEFINITION: Digital Signature Standard (DSS) is the digital signature algorithm (DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authentication of electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents.  … 
Definition continues below.
Digital Signature StandardsReports
26 - 50 of 355 Matches Previous Page  | Next Page
Beyond Compliance and the FDA Unique Device Identification Rule - How to Achieve Global Standardization
sponsored by LANSA
WHITE PAPER: This brief resource explores what the US Food and Drug Administration (FDA) Unique Device Identification (UDI) Rule is, why it was created, and how GS1 standards can be used to achieve compliance. Read on now to learn more.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

Business Continuity Management Systems
sponsored by ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Archive Security in a Tiered Storage Environment
sponsored by Plasmon
WHITE PAPER: Find out how to identify potential security risks and review various storage technologies and business operations that balance the security requirements of long term archiving with overall cost and operation of the archive.
Posted: 06 Sep 2006 | Published: 24 Aug 2006

Plasmon

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

Balancing compliance with information security threat assessment
sponsored by IBM
EGUIDE: This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.
Posted: 06 Dec 2011 | Published: 06 Dec 2011

IBM

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault

Better cloud security with certificate and key management
sponsored by Venafi
WEBCAST: This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
Posted: 09 Nov 2012 | Premiered: Nov 9, 2012

Venafi

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

Building Blocks of Transparent Web Security: Server-Gated Cryptography
sponsored by VeriSign, Inc
PRODUCT LITERATURE: Read a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.
Posted: 10 Sep 2007 | Published: 01 Sep 2005

VeriSign, Inc

Building the Right Mobile Security Toolkit
sponsored by ArcSight, an HP Company
EGUIDE: Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

ArcSight, an HP Company

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER: Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

BYOPC Strategy: Policies and Problem Solving
sponsored by Dell, Inc. and Intel®
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

Dell, Inc. and Intel®

Choose Your Next SOA Implementation Step Carefully
sponsored by Seros
WHITE PAPER: This white paper discusses the critical role of an ESB and an open standards-based reference architecture in a successful SOA initiative.
Posted: 25 Jun 2008 | Published: 25 Jun 2008

Seros

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by VeriSign Australia
WHITE PAPER: This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia

Cisco and Standards: Opening the Door to Borderless Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper details the need for standards adoption and adherence in order to reap the rewards in the following areas: Integration and testing, deployment, operations, problem resolution, availability, security, accessibility, open systems, cost savings, and choice.
Posted: 01 Dec 2010 | Published: 30 Nov 2010

Cisco Systems, Inc.

Citrix GoToMyPCCorporate - Security White Paper
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
Posted: 19 Jun 2008 | Published: 01 Jan 2006

Citrix Online - GotoMyPC

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Closing the Back Door on Network Application Vulnerabilities
sponsored by Sophos, Inc.
WHITE PAPER: This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Sophos, Inc.

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations.
Posted: 10 Aug 2009 | Published: 10 Jun 2009

Sophos, Inc.

Closing the IT Process Automation Gap
sponsored by Opalis Software, Inc.
WHITE PAPER: Many organizations are in the midst of implementing ITIL. But are they putting the appropriate operational processes into place? Learn how automating operational processes with run book automation software can help organizations better benefit from ITIL.
Posted: 28 Aug 2007 | Published: 01 Aug 2007

Opalis Software, Inc.

Cloud Encryption Gateway: Overcoming Cloud Security and Compliance Concerns
sponsored by CipherCloud
WHITE PAPER: Learn how CipherCloud protects data in Salesforce, Gmail, and Office 365. Find out how the solution sits between your users and your cloud applications and applies AES-256 encryption on the fly before sensitive data leaves the enterprise to provide protection without requiring changes to the cloud application or impacting application functionality.
Posted: 09 Aug 2012 | Published: 09 Aug 2012

CipherCloud

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel
26 - 50 of 355 Matches Previous Page    1 2 3 4 5    Next Page
 
DIGITAL SIGNATURE STANDARDS DEFINITION (continued): …  DSS is specified in Federal Information Processing Standard (FIPS) 186.DSA is a pair of large numbers that are computed according to the specified algorithm within parameters that enable the authentication of the signatory, and as a consequence, the integrity of the data attached. Digital signatures are generated through DSA, as well as verified. Signatures are generated in conjunction with the use of a private key; verification takes place in reference to a corresponding public key. Each signatory has their own paired public (assumed to be known to the general public) and private (known … 
Digital Signature Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement