Back to Results
First PageMeta Content
Key management / ID-based encryption / Delay-tolerant networking / ID-based cryptography / Security token / Tor / Public key infrastructure / Data Mule / Roaming / Cryptography / Network architecture / Public-key cryptography


Practical Security for Disconnected Nodes Aaditeshwar Seth Srinivasan Keshav School of Computer Science University of Waterloo, Canada {a3seth, keshav}@uwaterloo.ca
Add to Reading List

Document Date: 2006-03-26 21:15:04


Open Document

File Size: 236,46 KB

Share Result on Facebook

City

Hierarchical Identity / /

Company

Verisign / CRC Press / IDt / Intel / Disconnected Networks / /

Country

Canada / /

Currency

pence / /

/

Event

FDA Phase / Person Communication and Meetings / /

Facility

University of Waterloo / Computer Science University of Waterloo / /

IndustryTerm

End-systems / storage devices / Internet Denial / Internet-accessible gateway / closest Internet gateway / Internet region / bank transaction / delay tolerant network / ubiquitous computing / rogue routers / ad-hoc networks / storage device / wireless link / secure ubiquitous computing architectures / delay tolerant networks / kiosk operator / adequate practical solution / Internet Environments / mobile local router / offline mobile devices / Internet gateway / mail server / ingress routers / communication protocols / wireless capabilities / trusted computing base / client applications / rural and underwater communication networks / challenge-response protocol / simpler algorithm / wireless communication / /

OperatingSystem

DoS / /

Organization

Disconnected Nodes Aaditeshwar Seth Srinivasan Keshav School / University of Waterloo / DTN TCB / /

Person

Kevin Fall / Stephen Fung / Seth Srinivasan / Craig Gentry / Alice Silverberg / /

Position

Custodian / Personal Digital Assistant / correspondent / Private / /

Product

Franklin / ID1 / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

challenge-response protocol / WEP / Mobile routers / Public Key Infrastructure / mutually reachable DTN routers / DTN router / t-1 / PKI / Personal Digital Assistant / ingress routers / private key / Local DTN router / custodian DTN router / mobile device / ID-Based Encryption / SSL / WiFi-based router / mobile devices / Encryption / Cryptography / mobile DTN router / public key / mobile local router / ingress Local DTN router / cell phones / simpler algorithm / This protocol / rogue routers / communication protocols / same protocol / PDA / DTN routers / /

URL

http /

SocialTag