Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

Digital Signature Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DSS (Digital Signature Standards)
DEFINITION: Digital Signature Standard (DSS) is the digital signature algorithm (DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authentication of electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents.  … 
Definition continues below.
Digital Signature Standards Reports
51 - 75 of 698 Matches Previous Page  |  Next Page
An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

ComputerWeekly.com

Analyzing Ransomware and Potential Mitigation Strategies
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover how to apply a greylist approach to your ransomware prevention strategy, as well as 5 other recommendations.
Posted: 25 May 2017 | Published: 25 May 2017

CyberArk Software, Inc

Application Development Security Requires Forethought
sponsored by Veracode, Inc.
EGUIDE: Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Application Security Beyond SAST and DAST
sponsored by Veracode, Inc.
WHITE PAPER: Learn about trends in and the future of application security, as it stands today, and what organizations need to do to secure the most attacked and breached layer of their products: the app layer.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: Discover a step-by-step rundown of what you need to know to implement an advanced application security program successfully.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Applications and best practices to keep your mobile devices secure
sponsored by SearchSecurity.com
EGUIDE: Uncover best practices for keeping your mobile devices and applications secure.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

SearchSecurity.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Become GDPR-Ready and Data- Driven with an Expanded Information Management Portfolio
sponsored by Veritas
WHITE PAPER: Discover the growing importance of changing data protection regulations — in particular, the GDPR and how it takes information management out of the IT room and into the boardroom.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Veritas

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Airport Insecurity: The Case of Lost Laptops
sponsored by Dell India
WHITE PAPER: This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers.
Posted: 15 Jan 2010 | Published: 30 Jun 2008

Dell India

Aligning Security to Provide the Anticipated Business Results
sponsored by AT&T Corp
WHITE PAPER: This resource looks at some of the more important questions IT managers should consider when implementing a security solutions strategy.
Posted: 21 Sep 2011 | Published: 21 Sep 2011

AT&T Corp

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

APT-Style Attacks: How Cybercriminals are Using Them
sponsored by WatchGuard Technologies, Inc.
EGUIDE: New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.
Posted: 17 Jan 2017 | Published: 12 Jan 2017

WatchGuard Technologies, Inc.

Archive Security in a Tiered Storage Environment
sponsored by Plasmon
WHITE PAPER: Find out how to identify potential security risks and review various storage technologies and business operations that balance the security requirements of long term archiving with overall cost and operation of the archive.
Posted: 06 Sep 2006 | Published: 24 Aug 2006

Plasmon

Are You Complacent About Mobile Threats?
sponsored by Lookout
EGUIDE: In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Lookout

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

Balancing compliance with information security threat assessment
sponsored by IBM
EGUIDE: This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.
Posted: 06 Dec 2011 | Published: 06 Dec 2011

IBM

Beat Ransomware in 5 Easy Steps
sponsored by Unitrends
WHITE PAPER: With the FBI stating that: "The ransomware is that good. To be honest, we often advise people just to pay the ransom," the threat is obvious. Access this white paper now to learn how to beat ransomware in 5 easy steps.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Unitrends

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault

Best Practices for Secure and Efficient Onboarding and Off-boarding
sponsored by RES Software
WHITE PAPER: Onboarding and off-boarding can be a nightmare when it comes to account and network permissions. Learn why provisioning identities and access in today's enterprise environment is inefficient and how to leverage the benefits of a workforce that consistently has the digital resources it needs.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

RES Software

Better cloud security with certificate and key management
sponsored by Venafi
WEBCAST: This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
Posted: 09 Nov 2012 | Premiered: Nov 9, 2012

Venafi

Beyond Prevention: Cisco’s Next Generation Endpoint Security
sponsored by Cisco
WHITE PAPER: Discover how a continuous approach to endpoint security plus a big data architecture can enable key areas of transformative innovation in the battle against advanced threats that target the endpoint.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

Cisco

Beyond the Balance Sheet: Assessing the Impact of the New Lease Accounting Standard
sponsored by IBM
WHITE PAPER: This white paper will help CFOs deal with the 2015 FASB and IASB changes, which eliminate all operating leases from the income statement and move them onto the balance sheet as a capital expense.
Posted: 02 Nov 2012 | Published: 31 Jan 2012

IBM
51 - 75 of 698 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DIGITAL SIGNATURE STANDARDS DEFINITION (continued): …  DSS is specified in Federal Information Processing Standard (FIPS) 186.DSA is a pair of large numbers that are computed according to the specified algorithm within parameters that enable the authentication of the signatory, and as a consequence, the integrity of the data attached. Digital signatures are generated through DSA, as well as verified. Signatures are generated in conjunction with the use of a private key; verification takes place in reference to a corresponding public key. Each signatory has their own paired public (assumed to be known to the general public) and private (known … 
Digital Signature Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement