Back to Results
First PageMeta Content
Cryptographic primitive / Random oracle / Man-in-the-middle attack / Transport Layer Security / Password / Cryptographic hash function / Key / Secure Shell / Deniable authentication / Cryptography / Cryptographic protocols / Secure communication


Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14
Add to Reading List

Document Date: 2005-07-15 15:00:33


Open Document

File Size: 109,63 KB

Share Result on Facebook

City

Secure Network / Blockcipher / /

Company

Voltage Inc. / NEC Laboratories America / IBM / AES / AT&T Labs / Bell Labs / Avaya Labs / Telcordia Technologies / RTFM Inc. / CBC / RSA Laboratories / HP Labs / Microsoft / /

Currency

pence / /

/

Event

Business Partnership / /

Facility

Stevens Institute of Technology Dr. Wright / Rutgers University / Georgia Institute of Technology In / Princeton University / Carnegie Mellon University / Stevens Institute of Technology / University of Maryland Dr. Katz / /

IndustryTerm

software engineering / hash tree chain solution / secure systems / cryptographic tools / data-mining applications / overall software / Internet protocols / Internet infrastructure / ad-hoc networks / security systems / possible applications / bayesian networks / life applications / real-life applications / cryptographic algorithms / electronic voting technology / secure routing protocols / trusted computing base / security protocols / scalar product protocol / Internet communication / privacy preserving protocol / smart card protocol / cryptographic protocols / vulnerable algorithms / cryptographic systems / plug-in solution / e-voting / communication server / anti-spam applications / encryption algorithms / signature algorithms / hybrid systems / /

Organization

University of Maryland / Rutgers University / Princeton University / Rice University / Carnegie Mellon University / Portland State University / National Science Foundation / Stevens Institute of Technology / Johns Hopkins University / Georgia Institute of Technology In / Stanford University / /

Person

Rabin / Adam Stubblefield / Shai Halevi / Xavier Boyen / Eric Rescorla / Rebecca Wright / Jonathan Katz / Tom Shrimpton / Dawn Song / Mike Reiter / Steve Bellovin / Hugo Krawczyk / Yan Zong Ding / Adrian Perrig / Ari Juels / Dan Wallach / Constantin Serban / Dan Boneh / /

Position

Secure Fuzzy Extractors Speaker / Electronic Voting Speaker / Distributed Heterogeneous Data Speaker / fuzzy extractor / security model / Report Author / Fuzzy Commitment Speaker / Cryptography Speaker / Threshold Set Intersection Speaker / probabilistic model / Speaker / access control model / Access Control Speaker / Anonymous Communication Speaker / model / Derivation Using Common Pseudorandom Modes Speaker / Bounded Storage Model Speaker / Secure Routing Protocols Speaker / /

Technology

encryption algorithms / routing protocols / security protocols / secret key / key establishing algorithms / encryption / Cryptography / K2 protocol / scalar product protocol / privacy preserving protocol / S/MIME / previous protocols / smart card protocol / Internet protocols / SSL / operating systems / DNS / S-BGP protocol / secure routing protocols / simulation / electronic voting technology / signature algorithms / /

SocialTag