| Document Date: 2007-03-15 09:46:20 Open Document File Size: 219,96 KBShare Result on Facebook
City Kerberos / / Company G1 / X. / TLS Protocol Abdalla / Architectural Overview PECF-GSI / IDt / CBC / / Currency pence / / / Event Company Expansion / / Facility University of London Egham / / IndustryTerm secure password-based authentication protocol / security infrastructure / authentication server / natural delegation protocol / agreement protocols / grid systems / Online Certificate Status Protocol / public key infrastructure / grid security services / web browser / online data storage / delegation chain / escrow-free grid security infrastructure / above protocol / online credential repository / wireless grids / energy / password-enabled and certificate-free grid security infrastructure / suitable long-term solution / certificate-free grid security infrastructure / remote computing resources / grid security infrastructure / delegation protocol / grid applications / certificate-free authenticated key agreement protocol / related multiplicative / conventional wired networks / security services / additive / particular hosting server / grid computing / subsequent security services / handheld devices / handshake protocol / desktop computing environments / wireless devices / centralised authentication server / / MusicGroup The Grid / SA / / Organization sR PA / University of London Egham / Trusted Authority / Certificate Authority / UK Engineering and Physical Sciences Research Council / / Person Key Proxy Credential / Wei Lim / Key Gentry / Kenneth G. Paterson / Key Generator / Jason Crampton / / Position Private / / Product Franklin / / ProvinceOrState California / / Technology public key infrastructure / Application Program Interface / above protocol / TRACT algorithm / provably secure password-based authentication protocol / wireless devices / MyProxy protocol / API / PKI / GPS / hierarchical identity-based encryption / smart card / mobile phones / private key / ERIFY algorithm / key agreement protocols / encryption / hierarchical certificateless encryption / cryptography / certificate-free authenticated key agreement protocol / NCRYPT algorithm / underlying protocols / public key / XTRACT algorithm / natural delegation protocol / delegation protocol / ETUP algorithm / ECRYPT algorithm / 3.3 Protocols / certificate-based encryption / handshake protocol / IGN algorithm / identity-based one-pass delegation protocol / /
SocialTag |