Back to Results
First PageMeta Content
Key management / Group Domain of Interpretation / Diffie–Hellman key exchange / Perfect forward secrecy / XTR / Key distribution / Internet Security Association and Key Management Protocol / IPsec / Cryptography / Cryptographic protocols / Public-key cryptography


NRL Release Number[removed]Formalizing GDOI Group Key Management Requirements in NPATRL ∗
Add to Reading List

Document Date: 2013-04-29 11:02:45


Open Document

File Size: 148,49 KB

Share Result on Facebook

City

Washington / DC / Philadelphia / Alexandria / /

Company

Virtual Private Networks / GCKS / Cambridge University Press / Sciences Division ITT Industries Inc. / NGM KG / IEEE CS Press / IETF MSec Working Group / KGM / Nr SA / SEQ SA KD / High Assurance Computer Systems Naval Research Laboratory / nonces SA / G KG KG / /

Country

United States / /

/

Event

Company Listing Change / /

Facility

Prentice Hall / /

IndustryTerm

agreement protocols / security protocol / given protocol / authorization server / large / push protocol / open-ended cryptographic protocols / credit card payment transaction protocol / cryptographic protocols / public-key protocols / large protocols / pull protocol / logical infrastructure / encryption algorithms / computer-assisted verification tool / Internet Key Exchange / search space / search engine / security protocols / /

MarketIndex

NGM / SET / /

Organization

Cambridge University / National Science Foundation / Paul Syverson Iliano Cervesato Center for High Assurance Computer Systems Naval Research Laboratory Washington / United States Government / Pull Protocol / US Federal Reserve / Security Association / Request / Sequential Freshness for Pull Protocol / Stanford / /

Person

Dan Harkins / Forward Inference / Naganand Doraswamy / Robert Goldblatt / Danny Dolev / Brian F. Chellas / Andrew C. Yao / /

Position

editor / Group Controller / Forward / /

ProgrammingLanguage

DC / /

ProvinceOrState

Virginia / Pennsylvania / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

credit card payment transaction protocol / distribution protocols / pull protocol / encryption algorithms / Cliques protocol / 3.1 THE NPATRL LOGIC The NRL Protocol Analyzer Model The NRL Protocol / key distribution protocol / key distribution protocols / private key / security protocols / search engine / open-ended cryptographic protocols / key management protocols / key management protocol / two-party key distribution protocols / three-party key distribution protocols / encryption / Cryptography / security protocol / two-party key agreement protocols / push protocol / two-party protocols / public-key protocols / public key / SET protocol / given protocol / digital signature / GDOI protocol / /

URL

http /

SocialTag