Back to Results
First PageMeta Content
Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet


iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2
Add to Reading List

Document Date: 2014-07-20 15:18:58


Open Document

File Size: 539,29 KB

Share Result on Facebook

Company

IBM / iHTTP / SINE / NCSU Secure Open Systems / /

Country

United States / /

Currency

USD / /

/

Event

Reorganization / /

Facility

North Carolina State University / /

IndustryTerm

hash chain / origin server / web content / authentication/integrity techniques server / victim router / vulnerabilities targeting web applications / security protocols / /

NaturalFeature

Data Streams / /

Organization

U.S. Army Research Office / North Carolina State University / Raleigh / IBM Open Collaboration Faculty / U.S. National Science Foundation / /

ProgrammingLanguage

HTML / /

Technology

public key / DNS / victim router / HTTP 1.1 / Private Key / security protocols / caching / HTML / digital signature / SSL / WAN / /

SocialTag