< Day Day Up > |
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] ebXML (e-business XML) 2nd EncryptedData element (XML Encryption) 2nd EncryptedData schema (XML Encryption) 2nd 3rd 4th EncryptedKey element (XML Encryption) 2nd 3rd 4th EncryptedMethod element (XML Encryption) 2nd EncryptedType element (XML Encryption) encryption AES (Alogrithms Advanced Encryption Standard) AES encryption algorithm 2nd asymmetric cryptography DES encryption algorithm 2nd hash functions 2nd digital signatures and 2nd reasons to use 2nd keys items encrypted with same 2nd 3rd 4th modular exponentiation and one-way functions public key 2nd 3rd 4th RSA decryption RSA encryption secret key shared key 2nd 3rd 4th 5th XML 2nd 3rd shared key encryption block ciphers super encryption symmetric WebLogic Workshop wrapped key XML 2nd 3rd 4th 5th WS SecureConversation and XML attachments 2nd 3rd 4th 5th WebLogic Workshop XML Encryption 2nd EncryptionProperties element (XML Encryption) 2nd 3rd enterprise applications integration 2nd entity references DTDs and XML Signature 2nd 3rd ENV namespace (SOAP) Envelope element (SOAP) Enveloped Signature Transform 2nd exchanged information security issues 2nd exclusive canonicalization |
< Day Day Up > |