First Page | Document Content | |
---|---|---|
Date: 2014-07-20 15:18:58Internet protocols Cryptographic protocols Internet standards Authenticator Cryptographic hash function Security token Hash chain Transport Layer Security Cryptographic nonce Computing Cryptography Internet | iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2Add to Reading ListSource URL: gionta.orgDownload Document from Source WebsiteFile Size: 539,29 KBShare Document on Facebook |