![Computing / Coding theory / Error detection and correction / IP multicast / Secure multicast / Transmission Control Protocol / Password authentication protocol / Reed–Solomon error correction / Communications protocol / Information / Data / Internet protocols Computing / Coding theory / Error detection and correction / IP multicast / Secure multicast / Transmission Control Protocol / Password authentication protocol / Reed–Solomon error correction / Communications protocol / Information / Data / Internet protocols](https://www.pdfsearch.io/img/e0408de711ada6780fb4269a2e85d95c.jpg)
| Document Date: 2009-01-20 23:46:12 Open Document File Size: 214,52 KBShare Result on Facebook
Company Oracle / / Country Sudan / / / IndustryTerm generation algorithm / network-layer transmission protocol / polynomial-time algorithms / authenticator algorithm / secure and trusted routers / verification algorithm / probabilistic algorithms / probabilistic polynomial-time algorithm / adversarial network / honest routers / verification algorithms / trivial solution / decoder algorithm / transport protocol / signature algorithm / / Organization Brown University Department of Computer Science Providence / / Person Anna Lysyanskaya Roberto Tamassia Nikos / Ai / / Position MP / rt / / ProgrammingLanguage C / / Technology cryptography / UDP transport protocol / probabilistic algorithms / key generation algorithm / public key / network-layer transmission protocol / authenticator algorithm / verification algorithms / signing algorithm / honest routers / verification algorithm / signature algorithm / decoder algorithm / Probabilistic polynomial-time algorithms / secret key / probabilistic polynomial-time algorithm / digital signature / secure and trusted routers / two algorithms / /
SocialTag |