Search results

Jump to navigation Jump to search

Page title matches

  • ...[[cryptography | cryptographic]] techniques are used together to produce a digital signature, a [[cryptographic hash]] and a [[public key]] cryptosystem. ...digital signatures raises legal issues. There is an online reference <ref>Digital Signature Law Survey https://dsls.rechten.uvt.nl/</ref> for laws around the world.
    2 KB (277 words) - 05:48, 8 April 2024
  • 146 bytes (20 words) - 01:19, 30 November 2008
  • Auto-populated based on [[Special:WhatLinksHere/Digital signature]]. Needs checking by a human.
    707 bytes (89 words) - 20:09, 29 July 2010

Page text matches

  • [[Email authentication]] method that uses a [[Digital signature | digital signature]] to verify the content of a message.
    157 bytes (20 words) - 10:59, 12 October 2009
  • ...[[cryptography | cryptographic]] techniques are used together to produce a digital signature, a [[cryptographic hash]] and a [[public key]] cryptosystem. ...digital signatures raises legal issues. There is an online reference <ref>Digital Signature Law Survey https://dsls.rechten.uvt.nl/</ref> for laws around the world.
    2 KB (277 words) - 05:48, 8 April 2024
  • ...on [[Cryptography|cryptographic]] [[Tool|tools]] such as blockchains and [[Digital Signature|digital signatures]]. As a payment system, they should be independent, dist
    599 bytes (78 words) - 13:43, 14 January 2021
  • Auto-populated based on [[Special:WhatLinksHere/Digital signature]]. Needs checking by a human.
    707 bytes (89 words) - 20:09, 29 July 2010
  • {{r|Digital signature}}
    263 bytes (30 words) - 02:42, 30 November 2008
  • {{r|digital signature}}
    177 bytes (20 words) - 18:54, 3 January 2009
  • {{r|digital signature}}
    259 bytes (33 words) - 18:53, 29 July 2010
  • {{r|Digital signature}}
    1 KB (132 words) - 14:31, 22 March 2024
  • ...nding is asserted by having a trusted [[certification authority]] (CA) [[ digital signature | digitally sign]] each certificate. "The CA may base this assertion upon
    2 KB (365 words) - 05:49, 8 April 2024
  • {{r|Digital signature}}
    398 bytes (43 words) - 20:00, 29 July 2010
  • ...an encryption key for encryption and a decryption key for decryption, a [[digital signature]] ...is being used for [[authentication]], a private key is used to compute a [[digital signature]] or other credential of the sender. Any receiver can use the public key to
    3 KB (523 words) - 05:49, 8 April 2024
  • {{r|Digital signature}}
    654 bytes (85 words) - 17:13, 11 January 2010
  • {{r|Digital signature}}
    763 bytes (99 words) - 02:28, 1 April 2024
  • {{r|Digital signature}}
    2 KB (194 words) - 14:48, 4 April 2024
  • ...SA algorithm|RSA]], [[El Gamal]] (encrypt-only, not for signatures), and [[Digital Signature Algorithm]]. Supported [[block cipher]]s are [[IDEA]], [[Triple DES]], [[CA
    910 bytes (125 words) - 05:49, 8 April 2024
  • A direct defense is to use [[PGP]] or some other tool for [[digital signature]]s on important email.
    883 bytes (127 words) - 05:48, 8 April 2024
  • ...|RSA]] and [[Digital Signature Algorithm|DSA]] are two of the most popular digital signature schemes. Digital signatures are central to the operation of [[public key i
    8 KB (1,233 words) - 05:48, 8 April 2024
  • 2) verification of content (digital signature) ...onnection from those addresses. Signature methods like [[DKIM]] rely on a digital signature verifying the entire message and some of its headers. Both depend on the s
    5 KB (822 words) - 02:42, 3 February 2010
  • ...eys Identified Mail (DKIM) is an [[email authentication]] method using a [[digital signature]] added to the [[Email message headers | headers]] of a message, usually by 1) The signer uses the sender's [[Digital signature | private key]] to generate a signature of the message body and selected he
    7 KB (1,137 words) - 05:56, 11 December 2009
  • ...echanism would support the desired services.<ref>RFC3303, p.2 </ref> While digital signature mechanisms do not require a full Public Key Infrastructure, such mechanisms DNSSEC specifically refers to the core digital signature mechanisms used to validate secure DNS records. Three of its RRs, DNSKEY,
    13 KB (2,037 words) - 16:22, 30 March 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)