Back to Results
First PageMeta Content
Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security


Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols
Add to Reading List

Document Date: 2006-08-23 11:43:55


Open Document

File Size: 1,11 MB

Share Result on Facebook

City

Pretoria / /

Company

Building Dependable Distributed Systems / /

Country

Taiwan / South Africa / Namibia / United States / Angola / United Kingdom / /

Event

Bankruptcy / /

IndustryTerm

appropriate technology / car door locks / authentication protocol / car door / bank cards / security protocol / physical devices / bank account number / car lock / gas meter / will do to defeat these systems / car owner / challenge-response systems / car key / corporate security server / large systems / in-car token / electricity / car theft tools / challenge-response products / bank / garage server / pirate device / encryption algorithms / network operator / authentication chips / authentication device / bank card / software cartridges / online gaming / electricity meter / challenge-response protocols / car keys / authentication protocols / security protocols / /

Organization

Pretoria government / U.S. Air Force / state motor vehicle registration agency / North Atlantic Treaty Organization / South African Defense Force / South African Air Force / air force / /

Person

CHRISTOPHER STRACHEY / John Conway / /

Position

driver / officer / mathematician / parking attendant / engine controller / dealer / protocol designer / programmer / /

Region

southern Angola / Southern Africa / northern Namibia / /

Technology

authentication protocol / appropriate technology / encryption algorithms / ATM / mobile phones / security protocols / secret key / encryption / security protocol / authentication protocols / cryptographic authentication protocols / challenge-response protocols / authentication chips / 2 Protocols / Internet security protocols / /

SocialTag