Back to Results
First PageMeta Content
Cryptographic protocols / Hashing / Replay attack / Security token / RSA / SHA-1 / Trusted timestamping / Interlock protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions


Automatic Event-Stream Notarization Using Digital Signatures Bruce Schneier John Kelsey
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 149,61 KB

Share Result on Facebook

City

Minneapolis / /

Company

National Semiconductor / Digital Signatures Bruce Schneier John Kelsey Counterpane Systems / /

Currency

USD / /

/

Event

Person Communication and Meetings / FDA Phase / Company Expansion / /

Facility

Protocol building / /

IndustryTerm

hash chain / step in each protocol / digital timestamp server / symmetric and asymmetric encryption algorithm / secure protocols / digital signature algorithms / timestamp server / asymmetric encryption algorithm / token systems / external device / tamper-resistant device / obvious applications / encrypted communications / sample applications / auditable chain / interlock protocol / symmetric algorithm / signature algorithm / interlockwith-privacy protocol / real-world systems / internal network / /

Person

Carol / Bob / Alice / Louis Guillou / /

Position

auditor / engineer / hard drive controller / /

Product

Sim84 / /

ProvinceOrState

California / Minnesota / /

Technology

three protocol / LAN / specific symmetric algorithm / one protocol / interlocking protocol / signature algorithm / private key / encryption / asymmetric encryption algorithm / cryptography / symmetric algorithm / public key / DSA algorithm / 3 Protocol / digital signature algorithms / interlockwith-privacy protocol / digital signature / symmetric and asymmetric encryption algorithm / interlock protocol / /

SocialTag