Back to Results
First PageMeta Content
Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management


Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri
Add to Reading List

Document Date: 2015-04-04 16:50:19


Open Document

File Size: 569,78 KB

Share Result on Facebook

Company

Alice / Google / MySQL / CONIKS / Intel / /

/

Event

FDA Phase / /

IndustryTerm

given server / secure messaging protocol / trusted devices / log server / client software / secure communications application / communication systems / basic protocols / socialist millionaires protocol / communication applications / communication services / secure communications services / prior systems / communications services / cryptographic algorithms / large services / mobile devices / web server / communication network / binary search tree / /

OperatingSystem

UNIX / /

Organization

Princeton University / /

Person

Edward W. Felten / Michael J. Freedman / Aaron Blankstein / Marcela S. Melara / Joseph Bonneau / /

Position

Rt / auditor / ST Rt / domain administrator / tree head / recent signed tree root ST Rt / Private / /

Product

Chat / OTR / /

ProgrammingLanguage

Java / /

ProvinceOrState

Connecticut / /

Technology

end-toend encryption / RAM / key exchange protocol / UNIX / PKI / sneakernet / private key / SSL / mobile devices / encryption / secure messaging protocol / PGP email encryption / public key / Java / basic protocols / 6 The SMTP protocol / cryptographic algorithms / web server / /

SocialTag