First Page | Document Content | |
---|---|---|
Date: 2010-12-05 17:18:58Information Man-in-the-middle attack Interlock protocol Out-of-band Communications protocol Transport Layer Security Authentication Streaming media Computing Cryptographic protocols Data | ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:Add to Reading ListSource URL: www.cisa.umbc.eduDownload Document from Source WebsiteFile Size: 1,47 MBShare Document on Facebook |