cv cryptovision

Displaying 1-7 of 7 results

  • White Papers // Aug 2009

    Secure (W)LAN Access

    Wireless LANs (WLANs) - like all wireless technologies - are vulnerable to eavesdropping and unauthorized access. For this reason, virtually all WLAN products support the use of encryption and authentication, and in most installations these techniques are actually activated. However, the majority of WLAN access systems are only protected with...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    Remote Access VPN

    In a remote access connection between a client and a corporate network security threats are obvious. Therefore, it is necessary to install appropriate encryption and authentication mechanisms, for instance using Virtual Private Network (VPN) technology. While encryption is quite straight-forward, the decision for an authentication solution is far from being...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    cv act xml/signer - Digital Signatures for Novell Identity Manager 3.5.x

    The use of digital signatures in corporate IT environments renders a two-fold benefit: it enhances security and saves money. When used to secure workflows, digital signatures are especially valuable, because they can speed up existing business processes tremendously and enable the creation of new business processes. For this reason, the...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    cv Act PKIntegrated - The Ideal PKI Solution for Novell eDirectory Environments

    The term Public Key Infrastructure (PKI) comprises the entirety of the hardware, software and the organizational stipulations required for the appropriate use of encryption and related technologies in a larger user group. The PKI-technology is based on Public Key cryptography, in which every user receives a public and a private...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    Cv Act Sc/interface Universal Middleware for Smart Cards and Security Tokens

    With cv act sc/interface, cryptovision offers a seamless integrated middleware for smart cards and security tokens. Because cv act sc/interface implements the PKCS#11 and PKCS#15 (ISO7816-15) standards and also includes a Microsoft Cryptographic Service Provider (CSP), it can be integrated with the most applications. Furthermore one support Microsoft's Cryptography API...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    Side Channel Attacks on Smart Cards

    Countermeasures against side channel attacks - e.g. power attacks, based on an analysis of the power consumption, or electromagnetic attacks, which are based on the measurement of electromagnetic emanations - play an important role in modern implementations of cryptographic algorithms on Smart Cards or other security tokens. This has led...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    CV Act Library/sc the Cryptographic Library for Smart Cards and Other Security Tokens

    With cv act library/sc crypto vision offers a cryptographic library which is especially optimized for the integration of security ICs, just as they are used in smart cards, SIM modules, NFC and USB tokens. On these platforms the library offers an efficient way to realize a complete system with the...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    cv act xml/signer - Digital Signatures for Novell Identity Manager 3.5.x

    The use of digital signatures in corporate IT environments renders a two-fold benefit: it enhances security and saves money. When used to secure workflows, digital signatures are especially valuable, because they can speed up existing business processes tremendously and enable the creation of new business processes. For this reason, the...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    cv Act PKIntegrated - The Ideal PKI Solution for Novell eDirectory Environments

    The term Public Key Infrastructure (PKI) comprises the entirety of the hardware, software and the organizational stipulations required for the appropriate use of encryption and related technologies in a larger user group. The PKI-technology is based on Public Key cryptography, in which every user receives a public and a private...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    Secure (W)LAN Access

    Wireless LANs (WLANs) - like all wireless technologies - are vulnerable to eavesdropping and unauthorized access. For this reason, virtually all WLAN products support the use of encryption and authentication, and in most installations these techniques are actually activated. However, the majority of WLAN access systems are only protected with...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    Remote Access VPN

    In a remote access connection between a client and a corporate network security threats are obvious. Therefore, it is necessary to install appropriate encryption and authentication mechanisms, for instance using Virtual Private Network (VPN) technology. While encryption is quite straight-forward, the decision for an authentication solution is far from being...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    Cv Act Sc/interface Universal Middleware for Smart Cards and Security Tokens

    With cv act sc/interface, cryptovision offers a seamless integrated middleware for smart cards and security tokens. Because cv act sc/interface implements the PKCS#11 and PKCS#15 (ISO7816-15) standards and also includes a Microsoft Cryptographic Service Provider (CSP), it can be integrated with the most applications. Furthermore one support Microsoft's Cryptography API...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    Side Channel Attacks on Smart Cards

    Countermeasures against side channel attacks - e.g. power attacks, based on an analysis of the power consumption, or electromagnetic attacks, which are based on the measurement of electromagnetic emanations - play an important role in modern implementations of cryptographic algorithms on Smart Cards or other security tokens. This has led...

    Provided By cv cryptovision

  • White Papers // Aug 2009

    CV Act Library/sc the Cryptographic Library for Smart Cards and Other Security Tokens

    With cv act library/sc crypto vision offers a cryptographic library which is especially optimized for the integration of security ICs, just as they are used in smart cards, SIM modules, NFC and USB tokens. On these platforms the library offers an efficient way to realize a complete system with the...

    Provided By cv cryptovision