Back to Results
First PageMeta Content
Email / Electronic documents / Man-in-the-middle attack / Trusted third party / Alice and Bob / Simple Mail Transfer Protocol / Digital signature / Needham–Schroeder protocol / Cryptography / Public-key cryptography / Cryptographic protocols


TRICERT: A Distributed Certified E-Mail Scheme Giuseppe Ateniese Breno de Medeiros Michael T. Goodrich
Add to Reading List

Document Date: 2001-07-20 00:08:05


Open Document

File Size: 99,21 KB

Share Result on Facebook

City

Haifa / /

Company

Distributed Computing Systems / IEEE Computer Society Press / C. John Wiley & Sons Inc. / IBM / Alice / ACM Press / CBC / /

Country

Israel / United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

C. Hall / /

IndustryTerm

cryptographic technology / symmetric encryption algorithm / cryptographic tools / optimistic protocol / optimistic and online approaches / verification algorithm / online version / web browsing / classic solution / certified mail protocol / improved e-mail security protocol / actual protocol / security critical server / online service / usable certified e-mail systems / certified e-mail protocol / online schemes / published protocols / decryption protocol / secure database server / e - commerce / elegant online strategy / web server / optimistic protocols / online protocol / online server / hybrid protocols / Apache web server / compromised server / secure site / optimistic and online protocols / certified e-mail protocols / online case / public verification algorithms / off-line and online protocols / large networks / Online protocols / public encryption algorithms / online systems / hybrid protocol / web servers / online and optimistic approaches / software code / signature algorithms / verifiable escrow protocols / certified email protocols / brute-force algorithm / signature algorithm / /

OperatingSystem

Linux / Gnu / /

Organization

The Johns Hopkins University / U.S. Securities and Exchange Commission / Computer Science Department / Internet Society / U.S. Postal Service / Trusted Third Party / Technion / /

Person

S. Jarecki / N. Asokan / V / Bob / T. Rabin / H. Krawczyk / Michael Steiner / Silvio Micali / R. Gennaro / Michael T. Goodrich / Giuseppe Ateniese Breno de Medeiros / /

Position

first author / arbitrator / trusted arbitrator / simple text composer / forward / /

Product

Franklin / postal / Bob1 / TTP / Section / Postal Agent / /

ProgrammingLanguage

Java / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

RAM / actual protocol / three-message optimistic protocol / Linux / signature algorithm / optimistic and online protocols / optimistic protocol / secret key / fair protocol / CGI / encryption / cryptography / public encryption algorithms / brute-force algorithm / decryption protocol / randomized protocol / Java / verification algorithm / online certified e-mail protocol / present two protocols / five-message protocol / improved e-mail security protocol / 3 Our protocols / GUI / online protocol / hybrid protocol / symmetric encryption algorithm / 6.1 Protocol / public verification algorithms / certified mail protocol / certified email protocols / 5.1 Protocol / verifiable escrow protocols / SSL / off-line and online protocols / public key / certified e-mail protocols / firewall / certified e-mail protocol / web server / signature algorithms / /

URL

http /

SocialTag