Product Issues / Product Recall / FDA Phase / Person Communication and Meetings / Natural Disaster / /
Facility
Berkeley DB library / /
IndustryTerm
notary / network communications / web users / fixed / client with temporal safety against network / network notary / arbitrary Internet routers / client software / correct shadow server / modest notary infrastructure / logical protocol / cryptographic processing / query processing performance / public-key infrastructure / shadow server / pragmatic solution / insecure home networks / real-time snooping / coordinated / malicious notary server / notary infrastructure / web traffic / bank / large e-commerce websites / commonplace hardware / web clients / gateway router / insecure protocols / notary server / query-processing rate / shared wireless networks / basic notary protocol / Internet Explorer / network notary infrastructure / /
OperatingSystem
DoS / /
Organization
Probing Modules Notary Database Notary Server Service / Tofu MitM / U.S. Securities and Exchange Commission / USENIX Association / USENIX Annual Technical Conference USENIX Association / Carnegie Mellon University / /
Person
David G. Andersen Adrian Perrig Carnegie / Abraham Lincoln / Figure / /
Position
similar decentralized deployment model / including the large collection / Private / /
Product
Lclient / A Key-Trust Primitive / SSH2 / /
ProgrammingLanguage
C / K / /
ProvinceOrState
Manitoba / /
Technology
LAN / RAM / 5.2 Cross-Validation Protocol / gateway router / completely insecure protocols / arbitrary Internet routers / PKI / private key / MTU / UDP / SSL / public-key infrastructure / basic notary protocol / 323 Notary Client SSH Client Basic SSH Connection Notary Protocol / public key / DNS / HTTP / 1 Cross-Validation Protocol / wireless LAN / home routers / /