Back to Results
First PageMeta Content
Notary / Computer security / Man-in-the-middle attack / Secure Shell / Certificate authority / Notary public / Key authentication / Non-repudiation / Cryptography / Key management / Public-key cryptography


Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University Abstract
Add to Reading List

Document Date: 2008-05-29 17:15:02


Open Document

File Size: 1,12 MB

Share Result on Facebook

Company

Verisign / MitM Attacker Resources / P ERSPECTIVES / Tofu / Key-Trust Primitive / /

Currency

pence / /

Event

Product Issues / Product Recall / FDA Phase / Person Communication and Meetings / Natural Disaster / /

Facility

Berkeley DB library / /

IndustryTerm

notary / network communications / web users / fixed / client with temporal safety against network / network notary / arbitrary Internet routers / client software / correct shadow server / modest notary infrastructure / logical protocol / cryptographic processing / query processing performance / public-key infrastructure / shadow server / pragmatic solution / insecure home networks / real-time snooping / coordinated / malicious notary server / notary infrastructure / web traffic / bank / large e-commerce websites / commonplace hardware / web clients / gateway router / insecure protocols / notary server / query-processing rate / shared wireless networks / basic notary protocol / Internet Explorer / network notary infrastructure / /

OperatingSystem

DoS / /

Organization

Probing Modules Notary Database Notary Server Service / Tofu MitM / U.S. Securities and Exchange Commission / USENIX Association / USENIX Annual Technical Conference USENIX Association / Carnegie Mellon University / /

Person

David G. Andersen Adrian Perrig Carnegie / Abraham Lincoln / Figure / /

Position

similar decentralized deployment model / including the large collection / Private / /

Product

Lclient / A Key-Trust Primitive / SSH2 / /

ProgrammingLanguage

C / K / /

ProvinceOrState

Manitoba / /

Technology

LAN / RAM / 5.2 Cross-Validation Protocol / gateway router / completely insecure protocols / arbitrary Internet routers / PKI / private key / MTU / UDP / SSL / public-key infrastructure / basic notary protocol / 323 Notary Client SSH Client Basic SSH Connection Notary Protocol / public key / DNS / HTTP / 1 Cross-Validation Protocol / wireless LAN / home routers / /

URL

http /

SocialTag