Back to Results
First PageMeta Content
Cryptographic protocols / Computer security / Internet standards / Secure communication / Transport Layer Security / Jericho Forum / De-perimeterisation / Advanced Encryption Standard / Public-key cryptography / Cryptography / Data security / Security


Microsoft Word - Contents Thesis 1.10.doc
Add to Reading List

Document Date: 2015-06-15 16:32:20


Open Document

File Size: 1,55 MB

Share Result on Facebook

Company

Evgeny Barannikov / Capgemini Nederland B.V. / Rene Swarttouw 2007 Capgemini Nederland B.V. / /

Facility

Tunnel Mode Encapsulation Figure / Tunnel Mode / VU University / Dam et al. / Port Numbers Used / Utrecht VU University / /

IndustryTerm

Internet-driven enterprise environment / network communications / secure communications / patient healthcare information / cryptographic protocols / encryption solutions / communication technology / trust broker / inherently-secure computer systems / research / security technology / individual systems / security services / business to business / inherently-secure computer protocols / cryptography algorithms / de-perimeterized business-to-business networking / e - business / online collaboration / basic network / Internet age / e-shops / Internet business models / security protocols / electronic commerce / /

Organization

Congress / VU University Amsterdam / /

Person

Rene Swarttouw / Paula Blauw / Remco van Marle / Erik Genseen / Marco Plas / Ellen Blijenberg / Deborah Chedi / Alina Stan / Annemieke van Goor / Alina Stan Supervisor Capgemini / Leon Teheux / /

Position

Trust Broker / supervisor / Executive / /

Product

Jericho missile / /

ProgrammingLanguage

XML / /

Technology

encryption / Cryptography / XML / Public Key Infrastructure / 97 3.8 XML Encryption / Authentication algorithms / Encryption algorithms / 4.1 Data Encryption / security technology / inherently-secure computer protocols / PKI / Block Cipher / security protocols / communication technology / TCP/IP Protocol / SSL / cryptographic protocols / SSL/TLS security protocols / TCP/IP / cryptography algorithms / AES encryption / /

URL

http /

SocialTag