Back to Results
First PageMeta Content
Internet protocols / Internet / Computing / Data / Electronic commerce / Peer-to-peer / Public key certificate / X.509 / Certificate Management Protocol / Cryptographic protocols / Internet standards / Public-key cryptography


Document Date: 2011-07-09 03:31:29


Open Document

File Size: 626,23 KB

Share Result on Facebook

City

Lausanne / /

Company

Ad Hoc Networks / Quorum Systems / Wired Networks / Lucent / mCA / Computer Sciences / /

Country

Switzerland / Montenegro / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Purdue University / University Street / /

IndustryTerm

internal certificate update protocol / recommendation protocol / targeted communications / high-value communications / access protocol / online revocation service / communication systems / online detection / reference protocol / arbitrary server / internal protocols / individual server / certain intrusion/misbehavior detection algorithms / unreliable routing protocol / public-key infrastructure / multihop routing protocol / misbehavior detection algorithms / correct server / large distributed systems / server query8 protocol / multicast / wireless networks / update protocol / trust chain / online certification service / online identification service / query protocol / large protocol / noninteractive signing protocol / online part / online infrastructure / probabilistic multicast protocol / external protocols / self-organized public-key management / update protocols / server query protocol / lowvalue communications / certificate management protocols / reputation systems / wireless nodes / given compromised server / mobile devices / localized protocols / low-value communications / probabilistic protocol / online revocation authority / server update protocol / wireless links / secure and efficient public-key infrastructure / dCA server / server protocols / /

OperatingSystem

DoS / /

Organization

DIstributed CerTification Authority / Purdue University / Department of Computer Sciences / School of Computer and Communication Sciences / IEEE Computer Society / Ecole Polytechnique Fe´de´rale de Lausanne / /

Person

Jean-Pierre Hubaux / Jun Luo / /

Position

representative / Private / /

Product

JOINT AUTHORITY DICTATE AND Our / This / CtKc0 / Our solution / PAN / OUR / Fig / /

ProvinceOrState

California / Iowa / /

Technology

access protocol / certain intrusion/misbehavior detection algorithms / PAN server query protocol / 2.1 DICTATE External Protocol / certificate management protocols / PKI / large protocol / internal protocols / private key / DICTATE server update protocol / two protocols / 3.2 DICTATE Internal Protocol / 4.2 Protocol / update protocols / PAN server protocols / public-key infrastructure / probabilistic multicast protocol / misbehavior detection algorithms / mobile devices / internal certificate update protocol / cryptography / reference protocol / noninteractive signing protocol / underlying protocols / public key / update protocol / PAN server query8 protocol / external protocols / 2.2 DICTATE Internal Protocol / recommendation protocol / DICTATE protocols / simulation / underlying query protocol / PAN server update protocol / PDA / unreliable routing protocol / probabilistic protocol / aforementioned protocols / 4.3 Protocol / multihop routing protocol / /

SocialTag