Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

Digital Signature Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DSS (Digital Signature Standards)
DEFINITION: Digital Signature Standard (DSS) is the digital signature algorithm (DSA) developed by the U.S. National Security Agency (NSA) to generate a digital signature for the authentication of electronic documents. DSS was put forth by the National Institute of Standards and Technology (NIST) in 1994, and has become the United States government standard for authentication of electronic documents.  … 
Definition continues below.
Digital Signature StandardsReports
76 - 100 of 355 Matches Previous Page  | Next Page
De-risking IT Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Detecting the use of TrueCrypt
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It
sponsored by Lumension
WEBCAST: This webcast walks you through the fascinating nuts and bolts of the Flame attack and explains the technical details about how it worked and what lessons can be learned. Take an in-depth look into the entire attack by tuning in to learn more now.
Posted: 15 Feb 2013 | Premiered: Feb 15, 2013

Lumension

Data Security Laws in the US
sponsored by Quantum Corporation
ASSESSMENT TOOL: This list features a selection of Data Security laws in the US. As Quantum is a computer storage company, we cannot be held responsible for the accuracy of this list. Please check with your local government or legal advisors on the laws in your own location. Thank you.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Delivering corporate data securely on employee iPads™
sponsored by Citrix
WHITE PAPER: This white paper provides detailed insight into the latest iPad adoption trends and examines the issues that often accompany these devices from an IT perspective. Find out how the iPad differs from a traditional PC with respect to security and obtain helpful recommendations to help you balance user preferences with security and control.
Posted: 10 Jan 2012 | Published: 10 Jan 2012

Citrix

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Deploying a Wireless LAN
sponsored by BlackBerry
WHITE PAPER: Many factors must be considered when planning for a WLAN deployment. This paper provides a starting point for posing questions to WLAN equipment and service vendors.
Posted: 18 May 2007 | Published: 01 May 2007

BlackBerry

Detect and Survive
sponsored by Guidance Software, Inc.
WHITE PAPER: This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

Digital Certificates and the Apache Web Server
sponsored by Thawte Inc.
WHITE PAPER: This guide offers support on how to test, purchase, install, and use digital certificates for SSL connections on your Apache web server. View now to learn more.
Posted: 07 May 2013 | Published: 07 May 2013

Thawte Inc.

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Disable Lost PCs and Data Remotely
sponsored by Intel
VIDEO: Learn how the all new 2010 Intel® Core™ vPro™ processor family can help by disabling lost or stolen PCs via a poison pill, and how they can be easily reactivated via server-generated passwords thanks to Intel® Anti-Theft Technology and WinMagic.
Posted: 27 Apr 2010 | Premiered: 22 Jan 2010

Intel

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention
sponsored by Trend Micro, Inc.
CASE STUDY: When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

E-Book: Data loss prevention strategies, practices and tools
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Data loss prevention strategies, practices and tools are more important than ever. Read this e-book for expert advice on DLP, encryption, risk management and more.
Posted: 18 Nov 2009 | Published: 18 Nov 2009

SearchSecurity.com & SearchCompliance.com

E-Book: Data Protection Plans for Complying with Privacy Laws
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
Posted: 21 Oct 2010 | Published: 21 Oct 2010

SearchSecurity.com & SearchCompliance.com

E-Book: New Rules for HIPAA
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

SearchSecurity.com & SearchCompliance.com

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

E-Book: The Dark Side of Cloud Computing
sponsored by Astaro
EBOOK: Ask who controls the most powerful computing cloud in operation and Amazon EC2 or one of their competitors springs to mind. However there are other cloud computers which exist today that can directly challenge their might. Botnets and their creators represent a darker side of the Internet where money is a powerful motivator for creativity.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Astaro

E-guide-- Endpoint security suites: What to consider before renewal
sponsored by ESET
EGUIDE: In this expert e-guide, get tips on what you should consider before choosing, keeping, or upgrading your endpoint security software. Review endpoint security suite management issues, as well as how to negotiate with vendors.
Posted: 13 Jan 2010 | Published: 13 Jan 2010

ESET

E-Guide: Best Practices for Securing Your Network
sponsored by Dell, Inc.
EGUIDE: This expert e-guide explains how to effectively secure your network with a practical defense-in-depth approach to security. You’ll also find the critical elements all organizations must review as they consider SaaS products.
Posted: 26 May 2011 | Published: 26 May 2011

Dell, Inc.

E-Guide: Expert guide to Access Management Services in the Cloud
sponsored by Intel
EGUIDE: This expert tip takes a look at the steps you can take to utilize cloud services as they become more mainstream and highlights two key architectural and process components of access management services that must be considered in the cloud.
Posted: 26 May 2011 | Published: 26 May 2011

Intel

E-Guide: PCI DSS 2011: Key themes to watch
sponsored by IBM
EGUIDE: This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
Posted: 20 May 2011 | Published: 20 May 2011

IBM

E-Guide: Prioritizing Application Security Concerns
sponsored by Coverity
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

Coverity
76 - 100 of 355 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DIGITAL SIGNATURE STANDARDS DEFINITION (continued): …  DSS is specified in Federal Information Processing Standard (FIPS) 186.DSA is a pair of large numbers that are computed according to the specified algorithm within parameters that enable the authentication of the signatory, and as a consequence, the integrity of the data attached. Digital signatures are generated through DSA, as well as verified. Signatures are generated in conjunction with the use of a private key; verification takes place in reference to a corresponding public key. Each signatory has their own paired public (assumed to be known to the general public) and private (known … 
Digital Signature Standards definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement