![Public key infrastructure / Digital signature / Password / Key / Man-in-the-middle attack / Cryptanalysis / NTRU / Index of cryptography articles / Web of trust / Cryptography / Key management / Public-key cryptography Public key infrastructure / Digital signature / Password / Key / Man-in-the-middle attack / Cryptanalysis / NTRU / Index of cryptography articles / Web of trust / Cryptography / Key management / Public-key cryptography](https://www.pdfsearch.io/img/6d5547ad319a3c47075ff006beca0662.jpg)
| Document Date: 2013-11-26 20:44:05 Open Document File Size: 213,89 KBShare Result on Facebook
City Dulles / / Company Cigital Inc. / Meta Group / DigiCash Inc. / Ph.D. Cigital Inc. / / Country United States / / / Facility Massachusetts Institute of Technology / / IndustryTerm compliance using public-key technology / information services / anonymous communications / mix network server / online attacker / tamper-proof hardware / public-key infrastructure / malicious software attacks / beneficial technology / recovery systems / public-key technology / secure online voting / secure communications / as-yet-unused cryptographic protocols / cryptographic voting protocols / cryptographic algorithms / legacy systems / Online payment methods / mix network / cryptography protocols / e - commerce / Internet Explorer / secure and anonymous online elections / electronic commerce / / Organization U.S. government / Massachusetts Institute of Technology / U.S. Food and Drug Administration / IEEE Computer Society / / Person David Chaum / Silvio Micali / Leonard Adleman / Ron Rivest / Adam Young / Adi Shamir / Theory Adam Young / / / Position Research Scientist / guard / cashier / clerk / founder / professor / / ProvinceOrState Massachusetts / Virginia / / PublishedMedium Lecture Notes in Computer Science / / Technology compliance using public-key technology / PKI / VPN / smart card / private key / cryptographic voting protocols / file system encryption / cryptography protocols / technology of payment methods / public-key infrastructure / encryption / Cryptography / beneficial technology / Public Key / Clipper chip / public key system / public-key technology / / URL http /
SocialTag |