First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2012-03-19 20:00:26Open Document File Size: 434,85 KBShare Result on FacebookCitySpringer-Verlag / Marrakech / /CompanyAES / Distributed Computing Systems / Elsevier Inc. / Siemens / Nokia / THE EXECUTION TIMES / /CountryMorocco / / /EventFDA Phase / /FacilityPrentice Hall / /IndustryTermvalidation server / storage media / directory services / Online Certificate Status Protocol / required processing / desired security services / conventional public key algorithms / secure symmetric encryption algorithm / asymmetric algorithms / Wireless Public Key Infrastructure / wireless interface / secure and efficient solutions / online and timely responses / Internet Public Key Infrastructure / live video stream processing / security services / cryptography algorithms / profitable solution / handheld devices / suitable solution / /OrganizationCertification Authority / Validation Authority / Trusted Third Party / Registration Authority / /PersonA. Antipa / Key Generating / Mohsen Toorani / D. Hankerson / S. Vanstone / A. Menezes / Bob / Alice / R. Struik / Ali A. Beheshti / Scott Vanstone / D. Brown / / /PositionCorresponding Author / Private / judge / /ProductM-payment Systems / /ProgrammingLanguageJava / /ProvinceOrStateVirginia / New York / California / /TechnologyPublic Key Infrastructure / ECC/ECDSA cryptography algorithms / SMS / Status Protocol / key exchange protocol / secure symmetric encryption algorithm / Certificate Management Protocols / PKI / Lightweight Directory Access Protocol / smart card / mobile phones / private key / secret key / mobile devices / encryption / cellular telephone / cryptography / digital certificate / public key / conventional public key algorithms / Java / simultaneously performing encryption / GSM / digital signature / PDA / HMQV key exchange protocol / secure Diffie-Hellman protocol / encrypted using a secure symmetric encryption algorithm / /URLhttp /SocialTag |