Swiss Federal Institute of Technology / University of Waterloo / University of Waterloo Waterloo / /
IndustryTerm
hash chain / bank account / protocol / bank account number / stateless non-interactive protocol / message recognition protocol / straightfortion algorithm / recognition protocols / Internet users / low-power devices / usable and useful technologies / unnature verifying algorithm / non-interactive message recognition protocol / time-stamping services / low power devices / stateless non-interactive message recognition protocol / stateful non-interactive message recognition protocol / digital signature recognition protocol / lightweight cryptographic protocols / bounded adversary nition protocol / ad hoc networks / stateless non-interactive message recognition protocols / research / et al. protocol / low energy resources / message recognition protocols / entity recognition protocol / /
Organization
Atefeh Mashatan School of Computer and Communication Sciences / Cryptography / University of Waterloo / Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science / University of Waterloo Waterloo / Douglas R. Stinson David R. Cheriton School of Computer Science / David R. Cheriton School of Computer Science / Swiss Federal Institute of Technology / Lausanne / /
Person
Alice Bob Receive / Bob Internal / Alice Eve / Atefeh Mashatan / Ian Goldberg / Eve Bob / K. Eve Bob / Bob Receive / Alice / Douglas R. Stinson / Ian Goldberg David / Douglas R. Stinson David / /
Position
General / Professor and University Research Chair / Postdoctoral Researcher / attack model / Assistant Professor / member / /
Product
this / This solution / Lucks / A0 / B0 / Figure / /
ProgrammingLanguage
Hoc / /
ProvinceOrState
Saskatchewan / Bob / Alice / Iowa / /
RadioStation
Wait / /
Technology
stateful non-interactive message recognition protocol / Guy Fawkes protocol / message recognition protocols / unnature verifying algorithm / separate protocol / recognition protocols / secret key / message recognition protocol / Cryptography / digital signature recognition protocol / stateless non-interactive message recognition protocols / ZCK protocol / lightweight cryptographic protocols / stateless non-interactive message recognition protocol / third protocol / non-interactive message recognition protocol / digital signature / Jane Doe message recognition protocol / Lucks et al. protocol / broadband / previous recognition protocols / 3.1 Jane Doe protocol / existing protocols / polynomially bounded adversary nition protocol / entity recognition protocol / public key / straightfortion algorithm / stateless non-interactive protocol / Jane Doe protocol / /