Back to Results
First PageMeta Content
Data / Information / Secure communication / Internet standards / Computer network security / IEEE 802.11i-2004 / IEEE 802.1X / Transport Layer Security / Cipher suite / Internet protocols / Cryptographic protocols / Computing


C:/Documents and Settings/changhua/My Documents/research/doc/LaTeX/Complete/CCS05-Camera/f15-he.dvi
Add to Reading List

Document Date: 2007-12-18 01:03:21


Open Document

File Size: 203,93 KB

Share Result on Facebook

City

Alexandria / /

Company

INTRODUCTION Security / IEEE Task Group / TLS Invariants / ComputerCommunication Networks / /

Country

United States / /

Currency

USD / /

Event

FDA Phase / /

Facility

Stanford University / /

IndustryTerm

user devices / data protection protocol / wireless station / data confidentiality protocol / authentication server / sub-protocols / composite protocol / related wireless protocols / wireless network / wireless networking protocol / e-commerce systems / data confidentiality protocols / wireless networks / server / Given protocols / cryptographic protocols / large protocol / good key management / large protocols / message protocol / mutual authentication protocols / multicast applications / authentication protocols / /

OperatingSystem

DoS / /

Organization

Federal Bureau of Investigation / Stanford University / Robust Security Network Association / /

Person

Anupam Datta / John C. Mitchell / /

Position

General / Private / /

Product

Protocol Composition Logic (PCL) / Authentication / Y / using Protocol Composition Logic (PCL) / IEEE802 / Authentication Server / hQ1 / /

ProvinceOrState

Virginia / California / /

SportsLeague

Stanford University / /

Technology

WEP / one protocol / 802.11i wireless networking protocol / modified protocol / 802.11i protocols / data confidentiality protocol / mutual authentication protocols / Proof Method We use Protocol / 4Way Handshake protocol / large protocol / related wireless protocols / private key / two protocols / secret key / improved 4Way Handshake protocol / SSL / key management protocols / encryption / cryptography / composed protocol / public key / Key protocol / authentication protocols / Modelling protocols / composite protocol / using Protocol / data protection protocol / data confidentiality protocols / same protocol / two message protocol / Key Handshake protocol / component protocols / Handshake protocol / wireless LAN / /

SocialTag