Back to Results
First PageMeta Content
X.509 / ID-based encryption / Public key infrastructure / Authentication server / Revocation list / Certificate authority / Kerberos / Public key certificate / Authentication / Cryptography / Public-key cryptography / Key management


A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University
Add to Reading List

Document Date: 2007-03-15 09:46:20


Open Document

File Size: 219,96 KB

Share Result on Facebook

City

Kerberos / /

Company

G1 / X. / TLS Protocol Abdalla / Architectural Overview PECF-GSI / IDt / CBC / /

Currency

pence / /

/

Event

Company Expansion / /

Facility

University of London Egham / /

IndustryTerm

secure password-based authentication protocol / security infrastructure / authentication server / natural delegation protocol / agreement protocols / grid systems / Online Certificate Status Protocol / public key infrastructure / grid security services / web browser / online data storage / delegation chain / escrow-free grid security infrastructure / above protocol / online credential repository / wireless grids / energy / password-enabled and certificate-free grid security infrastructure / suitable long-term solution / certificate-free grid security infrastructure / remote computing resources / grid security infrastructure / delegation protocol / grid applications / certificate-free authenticated key agreement protocol / related multiplicative / conventional wired networks / security services / additive / particular hosting server / grid computing / subsequent security services / handheld devices / handshake protocol / desktop computing environments / wireless devices / centralised authentication server / /

MusicGroup

The Grid / SA / /

Organization

sR PA / University of London Egham / Trusted Authority / Certificate Authority / UK Engineering and Physical Sciences Research Council / /

Person

Key Proxy Credential / Wei Lim / Key Gentry / Kenneth G. Paterson / Key Generator / Jason Crampton / /

Position

Private / /

Product

Franklin / /

ProvinceOrState

California / /

Technology

public key infrastructure / Application Program Interface / above protocol / TRACT algorithm / provably secure password-based authentication protocol / wireless devices / MyProxy protocol / API / PKI / GPS / hierarchical identity-based encryption / smart card / mobile phones / private key / ERIFY algorithm / key agreement protocols / encryption / hierarchical certificateless encryption / cryptography / certificate-free authenticated key agreement protocol / NCRYPT algorithm / underlying protocols / public key / XTRACT algorithm / natural delegation protocol / delegation protocol / ETUP algorithm / ECRYPT algorithm / 3.3 Protocols / certificate-based encryption / handshake protocol / IGN algorithm / identity-based one-pass delegation protocol / /

SocialTag