<--- Back to Details
First PageDocument Content
Information / Man-in-the-middle attack / Interlock protocol / Out-of-band / Communications protocol / Transport Layer Security / Authentication / Streaming media / Computing / Cryptographic protocols / Data
Date: 2010-12-05 17:18:58
Information
Man-in-the-middle attack
Interlock protocol
Out-of-band
Communications protocol
Transport Layer Security
Authentication
Streaming media
Computing
Cryptographic protocols
Data

ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:

Add to Reading List

Source URL: www.cisa.umbc.edu

Download Document from Source Website

File Size: 1,47 MB

Share Document on Facebook

Similar Documents

Communications Protocol Category: Number: Audience: Issued: Owner:

DocID: 1vcl7 - View Document

Amateur Radio Continuous Wave Communications Protocol (CW ~ Morse Code) History and Application Tutorial

DocID: 1uYVU - View Document

Florida Department of Transportation (FDOT) Actuated Traffic Signal Controller (ASC) Management Information Base (MIB) and National Transportation Communications for ITS (Intelligent Transportation Systems) Protocol (NTC

DocID: 1ufnI - View Document

Commercial in Confidence EVK LoRes Serial Communications Protocol

DocID: 1u5IT - View Document

MindSet Communications Protocol June 28, 2010 e NeuroSky product families consist of hardware and software components for simple integration of this biosensor technology into consumer and industrial end-applications.

DocID: 1tL86 - View Document