| Document Date: 2006-07-26 10:17:27 Open Document File Size: 137,06 KBShare Result on Facebook
Company Alice / Sam / Needham / Simmons / / Country United Kingdom / / Event FDA Phase / Product Issues / / IndustryTerm security server / public key algorithm / software bulk encryption routine / authentication server / embedded distributed systems / public key protocol / public key protocols / online processing / shared-key encryption algorithm / faulty protocols / telephone network / crypto protocols / cryptographic algorithm / well known protocols / above protocol / online systems / shared key protocols / public key encryption algorithms / prepayment electricity meter systems / overnight batch processing / electricity / public-key algorithms / gross world product / cryptographic protocols / bank / cryptographic algorithms / above protocols / automatic teller machine systems / public key encryption algorithm / public-key algorithm / free electricity / bank fraud / shared-key encryption algorithms / distributed client-server systems / authentication protocols / / Organization Cambridge University / rB Each party / / Person Woo / Ross Anderson / Lam / Charlie / Bob / Alice / John Conway / Roger Needham / / Position teller / judge / / Product CCITT88 / protocols / Woo / BAN89 / Alice / / Technology public-key algorithm / KBS This protocol / above protocol / shared key protocols / CCITT X.509 protocol / underlying algorithms / private key / secret key / Public Key Protocols The shared-key encryption algorithms / outer encryption / cryptographic algorithm / encryption / Cryptography / PIN encryption / public key protocol / shared key encryption / satellite TV / public key / public key encryption algorithms / well known protocols / authentication protocols / shared-key encryption algorithm / public-key algorithms / following protocol / public key algorithm / underlying public key encryption algorithm / GSM / public key protocols / same protocol / digital signature / above protocols / crypto protocols / /
SocialTag |