<--- Back to Details
First PageDocument Content
Information / Man-in-the-middle attack / Interlock protocol / Out-of-band / Communications protocol / Transport Layer Security / Authentication / Streaming media / Computing / Cryptographic protocols / Data
Date: 2010-12-05 17:18:58
Information
Man-in-the-middle attack
Interlock protocol
Out-of-band
Communications protocol
Transport Layer Security
Authentication
Streaming media
Computing
Cryptographic protocols
Data

ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:

Add to Reading List

Source URL: www.cisa.umbc.edu

Download Document from Source Website

File Size: 1,47 MB

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic protocols / Public-key cryptography / Internet protocols / DiffieHellman key exchange / NeedhamSchroeder protocol / Communications protocol / Key exchange / Protocol composition logic / Interlock protocol

Journal of Computer Security–482 IOS Press 423 A derivation system and compositional logic

DocID: 1kaIs - View Document

Cryptographic protocols / Hashing / Replay attack / Security token / RSA / SHA-1 / Trusted timestamping / Interlock protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Automatic Event-Stream Notarization Using Digital Signatures Bruce Schneier John Kelsey

DocID: 13EQw - View Document

Information / ZRTP / MIKEY / Interlock protocol / Cryptographic protocols / Cryptography / Data

Microsoft Word - paper-strint-johnston.docx

DocID: IJOX - View Document

Information / Man-in-the-middle attack / Interlock protocol / Out-of-band / Communications protocol / Transport Layer Security / Authentication / Streaming media / Computing / Cryptographic protocols / Data

ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:

DocID: vu36 - View Document

Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Man-in-the-middle attack / XTR / IEEE P1363 / Public-key cryptography / Interlock protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / SPEKE

Cryptanalysis of the Dragony Key Exchange Protocol Dylan Clarke, Feng Hao ∗

DocID: e3i6 - View Document