- Industrie: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
In cryptography, the ordered sequence of entity certificates that can be processed, with the public key of the initial entity in the path, to determine the public key of the final entity in the path.
Industry:Telecommunications
In cryptography, pertaining to the state of a key that must no longer be used either to transmit information from the originator or to process received secure information.
Industry:Telecommunications
In cryptography, the existence of a cryptographic key in more than one secure physical location.
Industry:Telecommunications
In cryptography, the information in a certificate which is signed.
Industry:Telecommunications
In cryptography, of a key-establishment protocol, the condition in which the compromise of a session key or long-term private key after a given session does not cause the compromise of any earlier session.
Industry:Telecommunications
In cryptography, given particular elliptic curve parameters (and an elliptic curve private key d,) the elliptic curve point Q = dP.
Industry:Telecommunications
In cryptography, ciphertext that is formed by encrypting concatenated encryption elements.
Industry:Telecommunications
In cryptography, an order suspending the use of a certificate. Note: A certificate hold is a security procedure that is analogous to placing a hold on a bank account to prevent the fraudulent use of the account (including the transfer of funds from that account. )
Industry:Telecommunications
In cryptography, an integer value that is (a) unique within the issuing certificate authority (CA,) and (b) unambiguously associated with a certificate issued by that CA.
Industry:Telecommunications
In cryptography, an analytical attack in which a cryptanalyst can submit an unlimited number of plaintext messages and examine the corresponding ciphertext.
Industry:Telecommunications