A cryptographic boundary is
- ↑ Unified Capabilities, Framework 2013, App. C, at C-10 (full-text). See also NIST, FIPS 140-1, at 13.
- ↑ Catalog of Control Systems Security: Recommendations for Standards Developers (Apr. 2011 version), at 162.
Ad blocker interference detected!
Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers
Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.