<--- Back to Details
First PageDocument Content
Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management
Date: 2015-04-04 16:50:19
Electronic commerce
Cryptographic protocols
Secure messaging
Certificate authority
Transport Layer Security
Public key certificate
Man-in-the-middle attack
Cryptographic hash function
X.509
Cryptography
Public-key cryptography
Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 569,78 KB

Share Document on Facebook

Similar Documents

A Framework for Electronic Commerce Second Edition Edited by LILIAN EDWARDS and CHARLOTTE WAELDE The Internet—An Introduction for Lawyers

A Framework for Electronic Commerce Second Edition Edited by LILIAN EDWARDS and CHARLOTTE WAELDE The Internet—An Introduction for Lawyers

DocID: 1viOu - View Document

Chapter 14 Electronic Commerce ArticleGeneral

Chapter 14 Electronic Commerce ArticleGeneral

DocID: 1vitj - View Document

MS&E237 Spring 2011 Stanford University Andreas S. Weigend, Ph.D. The Social Data Revolution: Data Mining and Electronic Commerce

DocID: 1vhp5 - View Document

EU-Singapore FTA: Chapter 8: Services, Establishment and Electronic Commerce

EU-Singapore FTA: Chapter 8: Services, Establishment and Electronic Commerce

DocID: 1vbL0 - View Document

New Electronic Logging Device Requirement Can Help Support - Interstate or Foreign Commerce Exemption for Trucks and Trailers

New Electronic Logging Device Requirement Can Help Support - Interstate or Foreign Commerce Exemption for Trucks and Trailers

DocID: 1v4UI - View Document