Back to Results
First PageMeta Content
Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security


CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.
Add to Reading List

Document Date: 2011-12-05 05:22:54


Open Document

File Size: 564,11 KB

Share Result on Facebook

Company

American stores / /

Continent

America / Europe / /

Country

Taiwan / Netherlands / South Africa / Thailand / United Kingdom / /

Event

FDA Phase / /

Facility

TinySec library / /

IndustryTerm

appropriate technology / online customers / car door / bank cards / embedded systems / security protocol / physical devices / token technology / telephony / bank account number / car lock / gas meter / logon protocol / retail terminals / car owner / car makers / wine-waiter protocol / car key / energy / corporate security server / fallback metal key / large systems / in-car token / electricity / sensor networks / bank customers / bank / garage server / typical garage token product / wrong car / network operator / smartcard chip / authentication device / ad-hoc networking standard / web server / bank card payment system / remote key entry systems / bank card / electricity meter / challenge-response protocols / authentication protocols / security protocols / equipment / car park / /

OperatingSystem

TinyOS / /

Organization

army / state motor vehicle registration agency / US Defense Department / Department of Defense / /

Position

radio chip driver / parking attendant / engine controller / dealer / protocol designer / programmer / /

Product

Voice-Over-IP / /

Region

Scandinavia / /

Technology

appropriate technology / One token technology / block cipher / logon protocol / security protocols / secret key / operating system / wine-waiter protocol / nonvolatile memory / encryption / cellular telephone / cryptography / security protocol / EMV smartcard chip / 3 Protocols / cryptographic authentication protocols / challenge-response protocols / few protocols / VOIP / Voice-Over-IP / web server / not done using the block cipher itself / /

SocialTag