Back to Results
First PageMeta Content
Block cipher modes of operation / Authenticated encryption / Ticket Granting Ticket / Initialization vector / Secure Shell / Chosen-plaintext attack / Ciphertext / Key distribution center / Chosen-ciphertext attack / Cryptography / Cyberwarfare / Kerberos


Document Date: 2004-11-17 13:32:23


Open Document

File Size: 62,93 KB

Share Result on Facebook

City

Dallas / /

Company

SIAM Journal / Needham / C0 / /

Currency

pence / USD / /

/

Facility

National Institute of Standards and Technology / Kerberos Version 4∗ Tom Yu Sam Hartman Kenneth Raeburn Massachusetts Institute of Technology Abstract Version / terminal NUL / Key Distribution Center / Massachusetts Institute of Technology / /

IndustryTerm

authentication protocol / level network protocols / authentication infrastructure / Internet Draft / large networks / Internet RFC / Internet Request / conceptual services / binary packet protocol / hypothetical banking protocol / symmetric-key protocol / cryptographic protocols / secure protocol / bank / authentication network / Security protocols / open network systems / /

OperatingSystem

UNIX / /

Organization

Royal Society of London / Institute of Technology Abstract Version / U.S. Department of Commerce / Massachusetts Institute of Technology / Key Distribution Center / National Institute of Standards and Technology / Internet Engineering Task Force / /

Person

T. Yu / Amy Yu / S. Hartman / D. Schroeder / J. I. Schiller / K. Raeburn / Ted Ts / Perry Metzger / Steve Bellovin / Andrew File / Jeff Schiller / Jeff Hutzelman / J. Kohl / C. Neuman / Mark Eichin / Steve Dorner / Matt Blaze / J. G. Steiner / /

Position

administrator / /

ProvinceOrState

Texas / Massachusetts / /

PublishedMedium

IEEE Transactions on Software Engineering / SIAM Journal on Computing / Proceedings of the Royal Society / Communications of the ACM / /

Technology

high-level network protocols / symmetric-key protocol / UNIX / hypothetical banking protocol / block cipher / key distribution protocols / Security protocols / Kerberos protocol / SSH protocol / Secure Shell / trusted-third-party authentication protocol / SSL / well-designed protocol / Encryption / cryptography / updated protocol / AFS protocol / Kerberos encryption / 4 uses unauthenticated encryption / ASCII / SSH binary packet protocol / Using encryption / Kerberos authentication protocol / IP security protocols / AES encryption / unauthenticated encryption / 5 protocol / /

URL

http /

SocialTag