Back to Results
First PageMeta Content
Cryptographic protocols / Internet protocols / Signcryption / Online Certificate Status Protocol / X.509 / Elliptic curve cryptography / Revocation list / Public key infrastructure / Public key certificate / Cryptography / Public-key cryptography / Key management


Document Date: 2012-03-19 20:00:26


Open Document

File Size: 434,85 KB

Share Result on Facebook

City

Springer-Verlag / Marrakech / /

Company

AES / Distributed Computing Systems / Elsevier Inc. / Siemens / Nokia / THE EXECUTION TIMES / /

Country

Morocco / /

/

Event

FDA Phase / /

Facility

Prentice Hall / /

IndustryTerm

validation server / storage media / directory services / Online Certificate Status Protocol / required processing / desired security services / conventional public key algorithms / secure symmetric encryption algorithm / asymmetric algorithms / Wireless Public Key Infrastructure / wireless interface / secure and efficient solutions / online and timely responses / Internet Public Key Infrastructure / live video stream processing / security services / cryptography algorithms / profitable solution / handheld devices / suitable solution / /

Organization

Certification Authority / Validation Authority / Trusted Third Party / Registration Authority / /

Person

A. Antipa / Key Generating / Mohsen Toorani / D. Hankerson / S. Vanstone / A. Menezes / Bob / Alice / R. Struik / Ali A. Beheshti / Scott Vanstone / D. Brown / /

/

Position

Corresponding Author / Private / judge / /

Product

M-payment Systems / /

ProgrammingLanguage

Java / /

ProvinceOrState

Virginia / New York / California / /

Technology

Public Key Infrastructure / ECC/ECDSA cryptography algorithms / SMS / Status Protocol / key exchange protocol / secure symmetric encryption algorithm / Certificate Management Protocols / PKI / Lightweight Directory Access Protocol / smart card / mobile phones / private key / secret key / mobile devices / encryption / cellular telephone / cryptography / digital certificate / public key / conventional public key algorithms / Java / simultaneously performing encryption / GSM / digital signature / PDA / HMQV key exchange protocol / secure Diffie-Hellman protocol / encrypted using a secure symmetric encryption algorithm / /

URL

http /

SocialTag