Back to Results
First PageMeta Content
Security / Kerberos / Daemon / Secure Shell / Public-key cryptography / Key management / Virtual synchrony / Secure communication / Computer security / Computer network security / Computing / Cryptography


Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments  
Add to Reading List

Document Date: 2013-09-18 16:37:35


Open Document

File Size: 136,57 KB

Share Result on Facebook

City

Baltimore / /

Company

Asynchronous Networks / /

Country

United States / /

/

Event

Product Issues / /

Facility

Cliques library / Johns Hopkins University / University of California / USC Information Sciences Institute / /

IndustryTerm

agreement protocols / security protocol / intricate protocols / faulty network / wide area networks / communication systems / commandand-control systems / wide area network / membership services / daemon network / basic underlying algorithm / authenticated contributory group key management / point-to-point systems / agreement protocol / dynamic peer groups / mail services / low-level services / agreed-ordering protocol / communication services / secure communications / cryptographic protocols / routine security services / 100BaseT network / mechanisms to protect against malicious network / 10BaseT network / distributed key management / security services / data security protocols / encryption algorithms / corporate network / reliability services / computing / crossplatform applications / secure group communications / Client applications / collaborative applications / overlay network / security protocols / secure communications toolkit / pointto-point secure communication systems / open groups / fault-detection services / /

OperatingSystem

Unix / Linux / Solaris / Microsoft Windows / /

Organization

DiffieHellman / National Security Agency / USC Information Sciences Institute / Information and Computer Science Department / Johns Hopkins University / University of California / Irvine / Department of Computer Science / Trusted Third Party / Computer Networks Division / /

Person

Long / Giuseppe Ateniese / Encryption / John Schultz / Decryption / Damian Hasse / Theo Schlossnagle / Pairwise / Cristina Nita-Rotaru / Jonathan Stanton / Bruce Schneier / Marina Del Ray / /

/

Position

computation Controller / current controller / system administrator / group controller / fixed controller / administrator / application programmer / serial exponentiation Operation Join Leave Controller / current group controller / controller / member New session key computation Controller / /

Product

network / /

ProgrammingLanguage

Java / /

ProvinceOrState

Maryland / /

Technology

session key computation Encryption / encryption algorithms / Linux / Unix / API / key agreement protocol / block cipher / data security protocols / merging security protocols / security protocols / session key computation Cliques Encryption / secret key / key agreement protocols / SSL / key management protocols / Blowfish algorithm / WAN / controller Encryption / basic underlying algorithm / public key encryption / encryption / Ethernet / cryptography / security protocol / public key / Java / bulk data encryption / network routers / file sharing / Cliques protocols / session key computation Controller Encryption / cryptographic protocols / key computations Encryption / agreed-ordering protocol / /

URL

http /

SocialTag