<--- Back to Details
First PageDocument Content
Portable software / Cryptographic protocols / Online chat / Internet privacy / Cryptographic software / Off-the-Record Messaging / Authentication / Public key fingerprint / Pidgin / Software / Cryptography / Computing
Date: 2008-07-15 11:07:12
Portable software
Cryptographic protocols
Online chat
Internet privacy
Cryptographic software
Off-the-Record Messaging
Authentication
Public key fingerprint
Pidgin
Software
Cryptography
Computing

A User Study of Off-the-Record Messaging Ryan Stedman Kayo Yoshida Ian Goldberg

Add to Reading List

Source URL: cups.cs.cmu.edu

Download Document from Source Website

File Size: 421,39 KB

Share Document on Facebook

Similar Documents

Self-Determination Program Criminal Background Checks  DRAFT Who is required to get a background check? Anyone who provides direct personal care services to participants in

Self-Determination Program Criminal Background Checks DRAFT Who is required to get a background check? Anyone who provides direct personal care services to participants in

DocID: 1rqm5 - View Document

Network Working Group Request for Comments: 2726 Category: Standards Track J. Zsako BankNet

Network Working Group Request for Comments: 2726 Category: Standards Track J. Zsako BankNet

DocID: 1riYH - View Document

Texas Lottery® Sales Licensing Electronic Fingerprinting Instructions Applicants for a Texas Lottery Sales License must provide fingerprints for use in conducting a check of criminal history records of the Texas Departm

Texas Lottery® Sales Licensing Electronic Fingerprinting Instructions Applicants for a Texas Lottery Sales License must provide fingerprints for use in conducting a check of criminal history records of the Texas Departm

DocID: 1qNR6 - View Document

Instructions for Completing Fingerprint Card

Instructions for Completing Fingerprint Card

DocID: 1qlfe - View Document

Preprint of paper for WIFS2010.  1 INTRODUCTION

Preprint of paper for WIFS2010. 1 INTRODUCTION

DocID: 1qe1I - View Document