The Time-Stamp Protocol, or TSP is a cryptographic protocol for certifying timestamps using X.509 certificates and public key infrastructure. The timestamp is the signer's assertion that a piece of electronic data existed at or before a particular time. The protocol is defined in RFC 3161. One application of the protocol is to show that a digital signature was issued before a point in time, for example before the corresponding certificate was revoked.
The TSP protocol is an example of trusted timestamping. It has been extended to create the ANSI ASC X9.95 Standard.
and 22 Related for: Time stamp protocol information
The Time-StampProtocol, or TSP is a cryptographic protocol for certifying timestamps using X.509 certificates and public key infrastructure. The timestamp...
Thiele/Small parameters, of a loudspeaker driver Thrombospondin, protein Timestampprotocol in cryptography Titanium sublimation pump, a type of vacuum pump...
CANopen is a communication protocol stack and device profile specification for embedded systems used in automation. In terms of the OSI model, CANopen...
numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need...
transmitted in the transport stream or program stream. Presentation timestamps have a resolution of 90kHz, suitable for the presentation synchronization...
associated with their basic attributes, such as timestamps. This is an advantage over the common FTP protocol. The Internet Engineering Task Force (IETF)...
received about 10% of the improvements LibreOffice did in the period of time studied." As its native file format to save documents for all of its applications...
by attaching a timestamp that is prior to the actual moment the packet is sent. To avoid this method of cheating, the lockstep protocol requires each...
involved in providing Online Certificate Status Protocol (OCSP) responses by appending ("stapling") a time-stamped OCSP response signed by the CA (certificate...
different type of positive leap second handling associated with the Network TimeProtocol (NTP). This yields a system that does not conform to the POSIX standard...
However, the Kerberos protocol, as implemented in Microsoft Windows Active Directory, includes the use of a scheme involving timestamps to severely limit...
it becomes available. The DNP3 protocol supports time synchronization with an RTU. The DNP Protocol has timestamped variants of all point data objects...
synchronization schemes exist, so IEEE published a standard Precision TimeProtocol IEEE 1588 or "PTP", which allows sub-microsecond synchronization of...
Internet Protocol Flow Information Export (IPFIX) is an IETF protocol, as well as the name of the IETF working group defining the protocol. It was created...
(compositions with other protocols and other instances of the time-stampingprotocol itself). Buldas, Laur showed in 2007 that bounded time-stamping schemes are secure...
known time = time + 1; # event happens send(message, time); The algorithm for receiving a message is: (message, time_stamp) = receive(); time = max(time_stamp...
Parallel Redundancy Protocol (PRP) is a network protocol standard for Ethernet that provides seamless failover against failure of any network component...
applicants for the damage they have sustained. The convention has sixteen protocols, which amend the convention framework. The convention has had a significant...
Internet Protocol version 4 (IPv4) is the first version of the Internet Protocol (IP) as a standalone specification. It is one of the core protocols of standards-based...