pem-dev
[Top] [All Lists]

Security applications

1994-06-09 09:52:00
Folks:

I am working on a interface spec for messaging systems to both portable
and fixed hardware cryptographic modules.  One thing that I have been
having particular difficulty finding is specific examples of
requirements for hardware crypto in real-world applications.  I know
about the DMS and other military adventures, but what I am trying to
find is non-military applications, both inside and outside the
government.

If anyone has any information to share, I will summarize it and
redistribute it to the contributors.

Thanks in advance for any help you can offer.

Tom Jones

<Prev in Thread] Current Thread [Next in Thread>
  • Security applications, TCJones <=