First Page | Meta Content | |
---|---|---|
Document Date: 2008-12-04 05:05:52Open Document File Size: 645,22 KBShare Result on FacebookCitySan Francisco / Cergy-Pontoise / New York / London / /CompanyComputing And Information Systems / ACM Press / Computer-Communication Networks / SIAM Journal / A. J. Menezes S. A. / Springer-Verlag New York Inc. / Needham / IEEE Journal / CRC Press Inc. / Yahoo! / /CountryFrance / United States / United Kingdom / Ireland / /Currencypence / USD / / /IndustryTerminteractive proof-systems / Web Applications / communications security / graph isomorphism protocol / challengeresponse authentication protocols / graph isomorphism algorithm / noncommercial web applications / web browsers / web application / zeroknowledge proof protocols / web browser / web-application / WEB Classical Problems / web password habits / on-line shopping / malicious software / asymmetric cryptography communication protocols / technology choice / trivial online dictionary attack / servlet / probabilistic algorithms / Web Solutions / secure remote password protocol / polynomial time algorithm / challenge-response solution / hash generation algorithm / internet quality / asynchronous Web technologies / banking / Internet Society Network / private-key algorithm / computing / web authentication / asynchronous web / mit technology review / Web The classical way / asynchronous web technology / polynomialtime algorithm / Internet Explorer / /OrganizationScience Foundation Ireland / /PersonMaciej Zaremba Bill McDaniel / Stefan Decker / Peter Corcoran / Wojciech Zaremba / /Positionactor / Protection General / General / /ProductSecure Hash Algorithm - Version 1.0 (SHA1) / Secure Hash Algorithm - 1.0 (SHA1) / /ProgrammingLanguageJava / Ajax / XML / php / JavaScript / /ProvinceOrStateNew York / Manitoba / California / /PublishedMediumSIAM Journal on Computing / /TechnologyXML / HTTPS technology / polynomial time algorithm / secure remote password protocol / HTTPS protocol / proposed algorithms / private key / zero-knowledge protocols / Private-key algorithm / using Algorithm / SSL / asymmetric cryptography communication protocols / Ajax / graph isomorphism protocol / zeroknowledge proof protocols / ZKP protocol / Cryptography / 4.2 Private-key algorithm / known polynomialtime algorithm / graph isomorphism algorithm / asynchronous web technology / Public key / Java / challengeresponse authentication protocols / asynchronous Web technologies / HTTP / 1 Hypertext Transfer Protocol / ZKP protocols / hash generation algorithm / proposed protocol / http /URLhttp /SocialTag |