Search found 36 matches
- Mon Dec 19, 2016 12:02 am
- Forum: Algorithm School
- Topic: ECC cryptography on javacard
- Replies: 2
- Views: 8296
Re: ECC cryptography on javacard
Smart Card Bitcoin Wallet is a good example of how to use ECC algorithm.
- Wed Dec 14, 2016 2:41 am
- Forum: Questions & Answers
- Topic: When will the ECC tools be available?
- Replies: 3
- Views: 10610
- Wed Dec 14, 2016 2:31 am
- Forum: Solutions
- Topic: Digitally sign an office document
- Replies: 0
- Views: 18336
Digitally sign an office document
You can digitally sign a document for many of the same reasons you might sign a paper document. A digital signature is used to authenticate (authenticate: The process of verifying that people and products are who and what they claim to be. For example, confirming the source and integrity of a softw...
- Tue Dec 13, 2016 6:09 am
- Forum: Questions & Answers
- Topic: Can applets be installed by other applets?
- Replies: 2
- Views: 6769
Re: Can applets be installed by other applets?
Thank you for your prompt reply, thank you.
- Tue Dec 13, 2016 6:08 am
- Forum: Questions & Answers
- Topic: When will the ECC tools be available?
- Replies: 3
- Views: 10610
Re: When will the ECC tools be available?
Thank you for your prompt reply, thank you.
- Tue Dec 13, 2016 2:12 am
- Forum: Questions & Answers
- Topic: When will the ECC tools be available?
- Replies: 3
- Views: 10610
When will the ECC tools be available?
I saw that "Note: Generating key pair online with ECC algorithm is under construction. Stay tuned. "
but,When will the ECC tools be available?
but,When will the ECC tools be available?
- Tue Dec 13, 2016 1:48 am
- Forum: Open Source Applets
- Topic: Smart Card Fido U2F Applet
- Replies: 9
- Views: 67467
Re: Smart Card Fido U2F Applet
The Mission of the FIDO (Fast IDentity Online) Alliance is to change the nature of online authentication by: ⋅ Developing technical specifications that define an open, scalable, interoperable set of mechanisms that reduce the reliance on passwords to authenticate users. ⋅ Operati...
- Tue Dec 13, 2016 1:40 am
- Forum: Reader
- Topic: Reader for Windows 10 IoT Core
- Replies: 5
- Views: 13671
Re: Reader for Windows 10 IoT Core
Where can I find HID Reader?
- Sun Dec 11, 2016 11:56 pm
- Forum: Solutions
- Topic: Windows smart card logon
- Replies: 0
- Views: 18411
Windows smart card logon
How to secure your data centers when your critical infrastructure is administrated by contractors with just a password everyone knows ? How to prevent targeted APT (Advanced Persistent Threats) attacks where a malware collects administrators’ cached credentials ? How to prevent hardware keylogger fr...
- Sun Dec 11, 2016 11:45 pm
- Forum: Solutions
- Topic: Secure Email
- Replies: 0
- Views: 22508
Secure Email
Secure Email refers that sender encrypt the message with the recipient's digital certificate on condition that both of them have e-mail digital certificate. So that email on the internet will not be stolen during transmission and only the recipient can read encrypted mail. Even if the messages are r...