Federal Information Processing Standards Publication 186
GPTKB entity
Statements (66)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:regulations
|
gptkbp:amended_by |
gptkb:Federal_Information_Processing_Standards_Publication_186-1
gptkb:Federal_Information_Processing_Standards_Publication_186-2 gptkb:Federal_Information_Processing_Standards_Publication_186-3 |
gptkbp:content_type |
technical standard
|
https://www.w3.org/2000/01/rdf-schema#label |
Federal Information Processing Standards Publication 186
|
gptkbp:impact |
information security
|
gptkbp:is_adopted_by |
gptkb:private_sector
|
gptkbp:is_standardized_by |
gptkb:U._S._government
|
gptkbp:publication_year |
gptkb:1994
|
gptkbp:published_by |
gptkb:National_Academy_of_Sciences
|
gptkbp:regulatory_compliance |
federal contracts
|
gptkbp:related_to |
gptkb:crypt
gptkb:NIST_Special_Publication_800-56_A gptkb:NIST_Special_Publication_800-57 gptkb:NIST_Special_Publication_800-90_A gptkb:blockchain_technology gptkb:Certification gptkb:SHA-1 gptkb:SHA-3 gptkb:SHA-2 gptkb:X.509_certificates cybersecurity data integrity encryption risk management RSA algorithm authentication cloud security data protection digital signatures identity verification incident response key management network security secure communications security audits security training electronic signatures federal regulations secure transactions penetration testing compliance standards privacy laws integrity digital forensics non-repudiation security frameworks secure email software security hardware security vulnerability assessments security awareness programs information assurance mobile security ECDSA algorithm IT security policies secure web transactions Io T security ISO/ IEC standards DSA algorithm |
gptkbp:scope |
specifies methods for digital signatures
|
gptkbp:title |
gptkb:Wrestling
|
gptkbp:used_in |
federal agencies
|
gptkbp:bfsParent |
gptkb:Wrestling
|
gptkbp:bfsLayer |
4
|