| Document Date: 2011-07-10 02:35:13 Open Document File Size: 309,25 KBShare Result on Facebook
Company Bell Laboratories / CRC Press Inc. / / Country United States / / IndustryTerm knowledge-based protocols / by-product / open communications networks / exhaustive search attacks / password algorithm / host processor / entity authentication protocol / backup media / password search / unsecured telephone network / authenticated key establishment protocols / entity authentication protocols / software applications / telephone modem / on-line identity verification / identification protocols / trusted communications lines / wireless link / cellular telephony / challengeresponse protocols / identification protocol / public communications lines / on-line dictionaries / remote office site / crypt password algorithm / overall algorithm / exhaustive search / challenge-response protocols / encryption algorithm / actual communications / software application / communications permissions / / OperatingSystem UNIX / / Organization C. / Entity Authentication Chapter / US Federal Reserve / Identification and Entity Authentication Chapter / / Product UNIX / / Technology encryption / identification protocols / Cryptography / host processor / DES chips / challengeresponse protocols / public key / overall algorithm / sorting algorithm / encryption algorithm / UNIX / ASCII / UNIX password algorithm / entity authentication protocols / challenge-response protocols / identification protocol / UNIX crypt password algorithm / private key / function vs. encryption / entity authentication protocol / zero-knowledge-based protocols / operating system / digital signature / authenticated key establishment protocols / iterated encryption / integrated circuit / / URL www.cacr.math.uwaterloo.ca/hac / /
SocialTag |