Neuman–Stubblebine protocol

Results: 2



#Item
1Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
2Information / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Yahalom / Wide Mouth Frog protocol / Replay attack / Public-key cryptography / Kerberos / Cryptographic nonce / Cryptographic protocols / Cryptography / Data

Pranav Vyas, Dr. Bhushan Trivedi / International Journal of Engineering Research and Applications (IJERA) ISSN: [removed]www.ijera.com

Add to Reading List

Source URL: www.ijera.com

Language: English - Date: 2012-11-17 00:05:41
UPDATE