Back to Results
First PageMeta Content



Programming Language Methods in Computer Security John Mitchell Stanford University
Add to Reading List

Document Date: 2001-03-11 22:41:33


Open Document

File Size: 572,08 KB

Share Result on Facebook

City

Lincoln / /

Company

Prentice-Hall / uIs / Needham / uPi / IMH / CRC Press / Bob / MacMillan / /

Event

FDA Phase / M&A / /

IndustryTerm

inf-state systems / web transactions uContract signing protocols / uNon-deterministic infinite-state systems / uDefine protocol / secret protocol / uWrite protocol / public key protocol / software problems / encryption uSome protocols / uProof systems / uExpress protocol / asymmetric protocol / erroneous protocol / real-life protocol / Internet RFCs RSA FAQ / /

Organization

Stanford University / /

Person

Define / /

Position

guard / Private / Contract signing General / /

Product

Pad1 / B1 / N2 / F1 / N1 / /

ProgrammingLanguage

Java / C / /

Technology

encryption / Abuse-Free Contract Signing Asokan-Shoup-Waidner protocol / uWrite protocol / Authentication protocol / uNeedham-Schroeder public key protocol / Cryptography / nonce / probabilistic encryption / encryption uSome protocols / message constants Fixed depth encryption / public key / Java / uDefine protocol / RSA encryption / private key / secret key / inf-state systems Protocol / erroneous protocol / SSL / minimal framework Protocol / Client password hash Kc Abstract protocol / real-life protocol TGS Kv Service SSL Handshake Protocol / web transactions uContract signing protocols / uExpress protocol / /

URL

www.iacr.org / /

SocialTag