Bristol / An Underlying Technique Identity / Surrey / /
Company
Australia 2 Hewlett-Packard Laboratories / Dupont / Needham / Hewlett-Packard Laboratories / SIGA Technologies Inc. / /
Country
United Kingdom / /
Event
FDA Phase / /
Facility
Information Security Research Centre / Queensland University of Technology / University of London / /
IndustryTerm
logarithm algorithm / detail specific protocols / probabilistic polynomial time algorithm / sub-protocols / establishment protocol / Internet Protocols / identity-based key establishment protocols / concrete algorithms / Internet Protocols As / secure solutions / inefficient protocol / public-key infrastructure / communications efficiency / subsequent communications session / proposed protocols / agreement protocol / lower layer protocols / Internet Key Exchange The key establishment protocol / cryptographic protocols / resultant secure protocol / non-interactive key agreement protocol / shared-key solution / electronic communications / abstract protocols / establishment protocols / Internet Protocol Security / multi-flow sub-protocol / Internet Protocol / communications partners / positive applications / Internet Key Exchange / Internet communications / process protocols / security solutions / /
Organization
Diffie-Hellman / Queensland University of Technology / Brisbane / Trusted Authority / NUF-NAL / Nuffield Foundation / European Union / Information Security Research Centre / University of London / /
Person
Bob / Alice / Schroeder / /
Position
protocol translator / Private / /
Product
Franklin / AM / IKEv2 / Krawczyk / UM / /
ProgrammingLanguage
K / /
ProvinceOrState
Queensland / California / /
Technology
resultant secure protocol / IKE protocol / IP / PKI / MAC Verify signature Protocol / logarithm algorithm / identity-based encryption / non-interactive key agreement protocol / private key / Basic SIGMA protocol / IKE protocols / public-key infrastructure / public key encryption / encryption / cryptography / Diffie-Hellman key agreement protocol / Public key / Internet Protocol / process protocols / real protocols / 2 Internet Key Exchange The key establishment protocol / key establishment protocols / key establishment protocol / AM SK-secure protocol / abstract protocols / lower layer protocols / identity-based key establishment protocols / digital signature / probabilistic polynomial time algorithm / inefficient protocol / multi-flow sub-protocol / detail specific protocols / SK-secure protocol / AKE protocol / /