Back to Results
First PageMeta Content
Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / RSA / Otway–Rees protocol / Cryptography / Cryptographic protocols / Public-key cryptography


Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia
Add to Reading List

Document Date: 2005-06-07 06:43:38


Open Document

File Size: 213,92 KB

Share Result on Facebook

City

Washington / DC / /

Company

IEEE Computer Society Press / Environment Well-Formedness E NV / Needham / Mobile Distributed Systems / AME AND VAR E NV / E NV / Computer-Communication Networks / /

Country

United States / /

Currency

pence / USD / /

/

Event

FDA Phase / /

IndustryTerm

authentication protocol / multi-protocol systems / authentication protocols / security protocols / /

Organization

United Nations / European Union / /

Person

Act / J.C.Herzog / Gavin Lowe / Simon S. Lam / Thomas Y. C. Woo / Jeffrey / Joshua D. Guttman / F. Javier Thayer / Michele Bugliesi Riccardo Focardi Matteo / Gordon / /

Position

General / Private / /

Product

Pentax K-x Digital Camera / Example / I2 / /

ProvinceOrState

Illinois / /

PublishedMedium

Theoretical Computer Science / IEEE Transactions on Software Engineering / Lecture Notes in Computer Science / /

Technology

encryption / authentication protocol / spi calculus Protocol / cryptography / Public Key Protocol / public key / authentication protocols / INTRODUCTION Authentication protocols / process Protocol / security protocols / private key / dom / secret key / Operating Systems / specific protocol / TYPE AND EFFECT SYSTEM Authentication protocols / Network Protocols / /

SocialTag