This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Information for "Why you need to use a FIPS 140-2 validated cryptomodule"

Jump to: navigation, search

Basic information

Display titleWhy you need to use a FIPS 140-2 validated cryptomodule
Default sort keyWhy you need to use a FIPS 140-2 validated cryptomodule
Page length (in bytes)1,924
Page ID7749
Page content languageEnglish (en)
Page content modelwikitext
Indexing by robotsDisallowed
Number of redirects to this page0
Counted as a content pageYes

Page protection

EditAllow all users (infinite)
MoveAllow all users (infinite)

Edit history

Page creatorDeleted user (talk | contribs)
Date of page creation19:15, 12 December 2008
Latest editorKirstenS (talk | contribs)
Date of latest edit12:24, 29 March 2009
Total number of edits12
Total number of distinct authors2
Recent number of edits (within past 90 days)0
Recent number of distinct authors0