Back to Results
First PageMeta Content
Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography


This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi
Add to Reading List

Document Date: 2011-07-10 02:35:13


Open Document

File Size: 332,48 KB

Share Result on Facebook

Company

CRC Press Inc. / A. Upon / /

Facility

Key distribution center / /

IndustryTerm

on-line update / selected key management applications / message-translation protocol / notary services / potential communications / authentication server / communications models / communications path / establishment protocols / communications viewpoint / access server / trusted server / trusted on-line server / tamper-resistant hardware / real-time availability / real-time means / cryptographic services / fewer real-time message exchanges / spoked-wheel network / untrusted on-line server / secure hardware / trusted off-line server / proper management / alternate solution / symmetric-key vs. public-key systems / challenge-response protocols / simplified key management / hybrid protocols / communications environment / /

Position

Private / /

ProvinceOrState

California / /

Technology

encryption / Cryptography / specific key establishment protocols / public key / public-key encryption / 545 Algorithm / key establishment protocols / challenge-response protocols / private key / message-translation protocol / secret key / access control list / /

URL

www.cacr.math.uwaterloo.ca/hac / /

SocialTag