Back to Results
First PageMeta Content
Cipher / Key / Symmetric-key algorithm / Man-in-the-middle attack / Cryptographic key types / Cryptography / Key management / Public-key cryptography


algo logic Algologic Research and Solutions Technical Report Negotiating public keys in asymmetric key cryptography
Add to Reading List

Open Document

File Size: 60,83 KB

Share Result on Facebook

Country

Macau / India / /

/

Facility

United Nations University / International Institute of Software Technology / /

IndustryTerm

negotiation protocol / public key negotiation protocol / cryptographic algorithm / web server / /

Movie

Man in the middle / Man in the middle 5 / /

OperatingSystem

Unix / Linux / Suse Linux / /

Organization

United Nations University / Certificate Authority / International Institute of Software Technology / /

Person

Alice Traditionally / Bob Traditionally / Partha / Sita / Rama / Alice / /

Position

author / http /

ProgrammingLanguage

LaTeX / /

PublishedMedium

the Hindu / /

Technology

symmetric key encryption / public key negotiation protocol / Asymmetric key encryption / Linux system / Linux / private key / secret key / 1 4 Public key negotiating protocol / cryptographic algorithm / encryption / cryptography / 5 4 Public key negotiating protocol This protocol / public key / 5 Public key negotiation protocol / following protocol / 3 Algorithm / This protocol / web server / using Rama’s public key / /

URL

http /

SocialTag