Back to Results
First PageMeta Content
Computer architecture / Network protocols / Delay-tolerant networking / Internet privacy / ID-based encryption / Data Mule / Security token / Tor / Cisco IOS / Network architecture / Computing / Cryptography


Practical Security for Disconnected Nodes Aaditeshwar Seth Urs Hengartner Srinivasan Keshav School of Computer Science
Add to Reading List

Document Date: 2006-03-26 21:10:58


Open Document

File Size: 236,54 KB

Share Result on Facebook

City

Hierarchical Identity / /

Company

Verisign / CRC Press / IDt / Intel / Disconnected Networks / /

Country

Canada / /

Currency

pence / /

/

Event

Person Communication and Meetings / /

Facility

University of Waterloo / Computer Science University of Waterloo / /

IndustryTerm

End-systems / storage devices / Internet Denial / Internet-accessible gateway / cellular networks / closest Internet gateway / Internet region / bank transaction / delay tolerant network / ubiquitous computing / opportunistic wireless connection / rogue routers / ad-hoc networks / Internet connectivity / storage device / wireless link / secure ubiquitous computing architectures / delay tolerant networks / kiosk operator / adequate practical solution / Internet Environments / mobile local router / authentication challenge response protocol / Location management / public network / offline mobile devices / Internet gateway / mail server / ingress routers / communication protocols / wireless capabilities / Internet kiosk / trusted computing base / client applications / rural and underwater communication networks / challenge-response protocol / simpler algorithm / wireless communication / /

OperatingSystem

DoS / /

Organization

Disconnected Nodes Aaditeshwar Seth Urs Hengartner Srinivasan Keshav School / University of Waterloo / DTN TCB / Link association / Hierarchical Identity Based Encryption Identity Based Cryptography / /

Person

Kevin Fall / Stephen Fung / Craig Gentry / Seth Urs Hengartner Srinivasan / Alice Silverberg / /

Position

DTN custodian / custodian / Personal Digital Assistant / correspondent / forward secrecy / Private / /

Product

Franklin / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

fixed local DTN router / challenge-response protocol / WEP / Mobile routers / Public Key Infrastructure / mutually reachable DTN routers / DTN router / t-1 / PKI / Personal Digital Assistant / ingress routers / private key / Local DTN router / custodian DTN router / mobile device / WiFibased router / ID-Based Encryption / SSL / DSL / mobile devices / Encryption / Cryptography / mobile DTN router / public key / mobile local router / ingress Local DTN router / control message encryption / cell phones / simpler algorithm / rogue routers / communication protocols / same protocol / Mutual authentication challenge response protocol This protocol / Hierarchical Identity Based Encryption / PDA / DTN routers / /

URL

http /

SocialTag