Back to Results
First PageMeta Content
Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols


On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1
Add to Reading List

Document Date: 2009-11-13 20:20:01


Open Document

File Size: 246,64 KB

Share Result on Facebook

Company

Inderscience Enterprises Ltd. / Cryptography Laboratory / Needham / /

/

EntertainmentAwardEvent

Oscar / /

Event

FDA Phase / /

Facility

Swiss Federal Institute of Technology / University of Waterloo / University of Waterloo Waterloo / /

IndustryTerm

hash chain / bank account / protocol / bank account number / stateless non-interactive protocol / message recognition protocol / straightfortion algorithm / recognition protocols / Internet users / low-power devices / usable and useful technologies / unnature verifying algorithm / non-interactive message recognition protocol / time-stamping services / low power devices / stateless non-interactive message recognition protocol / stateful non-interactive message recognition protocol / digital signature recognition protocol / lightweight cryptographic protocols / bounded adversary nition protocol / ad hoc networks / stateless non-interactive message recognition protocols / research / et al. protocol / low energy resources / message recognition protocols / entity recognition protocol / /

Organization

Atefeh Mashatan School of Computer and Communication Sciences / Cryptography / University of Waterloo / Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science / University of Waterloo Waterloo / Douglas R. Stinson David R. Cheriton School of Computer Science / David R. Cheriton School of Computer Science / Swiss Federal Institute of Technology / Lausanne / /

Person

Alice Bob Receive / Bob Internal / Alice Eve / Atefeh Mashatan / Ian Goldberg / Eve Bob / K. Eve Bob / Bob Receive / Alice / Douglas R. Stinson / Ian Goldberg David / Douglas R. Stinson David / /

Position

General / Professor and University Research Chair / Postdoctoral Researcher / attack model / Assistant Professor / member / /

Product

this / This solution / Lucks / A0 / B0 / Figure / /

ProgrammingLanguage

Hoc / /

ProvinceOrState

Saskatchewan / Bob / Alice / Iowa / /

RadioStation

Wait / /

Technology

stateful non-interactive message recognition protocol / Guy Fawkes protocol / message recognition protocols / unnature verifying algorithm / separate protocol / recognition protocols / secret key / message recognition protocol / Cryptography / digital signature recognition protocol / stateless non-interactive message recognition protocols / ZCK protocol / lightweight cryptographic protocols / stateless non-interactive message recognition protocol / third protocol / non-interactive message recognition protocol / digital signature / Jane Doe message recognition protocol / Lucks et al. protocol / broadband / previous recognition protocols / 3.1 Jane Doe protocol / existing protocols / polynomially bounded adversary nition protocol / entity recognition protocol / public key / straightfortion algorithm / stateless non-interactive protocol / Jane Doe protocol / /

SocialTag