Back to Results
First PageMeta Content
Electronic commerce / Cryptographic protocols / Ciphertext / Key / Password / Malware / Man-in-the-middle attack / RSA / Key encapsulation / Cryptography / Public-key cryptography / Key management


CS 161 Computer Security Spring 2010
Add to Reading List

Document Date: 2010-04-03 00:22:05


Open Document

File Size: 85,49 KB

Share Result on Facebook

Company

AES / Alice / A (iii) Alice / Twitter / /

Country

United States / /

IndustryTerm

bank web server / exam solutions / advertising sites / online banking / symmetric-key encryption algorithm / bank account / sign-up protocol / web proxy / bank / Web browsers / malicious web site / bank address / symmetric-key algorithm / false advertising / wireless device / well-designed cryptography algorithm / bank website / web server / Web form / bank server / correct bank / symmetric key encryption algorithm / /

OperatingSystem

Unix / /

Organization

African Union / European Central Bank / /

ProvinceOrState

NU / /

Technology

sign-up protocol / Encryption / symmetric key encryption algorithm / cryptography / WEP / public key / DNS / network interface card / wireless device / PKI / block cipher / HTTP / Unix operating system / private key / symmetric-key encryption algorithm / MAC algorithm / operating system / digital signature / symmetric-key algorithm / SSL / well-designed cryptography algorithm / web server / stream cipher / /

URL

www.bankobytes.com / http /

SocialTag