Back to Results
First PageMeta Content
Alice and Bob / Ciphertext / RSA / Kerberos / XTR / Needham–Schroeder protocol / Security protocol notation / Cryptography / Cryptographic protocols / Public-key cryptography


Programming Satan’s Computer Ross Anderson and Roger Needham Cambridge University Computer Laboratory
Add to Reading List

Document Date: 2006-07-26 10:17:27


Open Document

File Size: 137,06 KB

Share Result on Facebook

Company

Alice / Sam / Needham / Simmons / /

Country

United Kingdom / /

Event

FDA Phase / Product Issues / /

IndustryTerm

security server / public key algorithm / software bulk encryption routine / authentication server / embedded distributed systems / public key protocol / public key protocols / online processing / shared-key encryption algorithm / faulty protocols / telephone network / crypto protocols / cryptographic algorithm / well known protocols / above protocol / online systems / shared key protocols / public key encryption algorithms / prepayment electricity meter systems / overnight batch processing / electricity / public-key algorithms / gross world product / cryptographic protocols / bank / cryptographic algorithms / above protocols / automatic teller machine systems / public key encryption algorithm / public-key algorithm / free electricity / bank fraud / shared-key encryption algorithms / distributed client-server systems / authentication protocols / /

Organization

Cambridge University / rB Each party / /

Person

Woo / Ross Anderson / Lam / Charlie / Bob / Alice / John Conway / Roger Needham / /

Position

teller / judge / /

Product

CCITT88 / protocols / Woo / BAN89 / Alice / /

Technology

public-key algorithm / KBS This protocol / above protocol / shared key protocols / CCITT X.509 protocol / underlying algorithms / private key / secret key / Public Key Protocols The shared-key encryption algorithms / outer encryption / cryptographic algorithm / encryption / Cryptography / PIN encryption / public key protocol / shared key encryption / satellite TV / public key / public key encryption algorithms / well known protocols / authentication protocols / shared-key encryption algorithm / public-key algorithms / following protocol / public key algorithm / underlying public key encryption algorithm / GSM / public key protocols / same protocol / digital signature / above protocols / crypto protocols / /

SocialTag