Back to Results
First PageMeta Content
Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing


AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev
Add to Reading List

Document Date: 1998-07-28 17:01:12


Open Document

File Size: 70,85 KB

Share Result on Facebook

Company

Hewlett Packard / Sun Microsystems / Advanced Telecommunications / NTP / CBC / RSA Laboratories / Qualcomm / /

Event

FDA Phase / /

Facility

University of Delaware / College Park / David L. Mills University of Delaware Newark / /

IndustryTerm

directory services / public-private key pair using algorithms / related transport protocols / particular server / client-server / secure services / Internet Draft / Internet time synchronization / inexhaustible processing time / synchronization services / secure directory services / cryptographic media / survivable network / unbroken chain / command/control networks / certificate media / session key management protocol / remote server / battlefield systems / web servers / time-critical services / Internet security association / legitimate server / message-digest algorithm / tactical networks / universal access to data products / certificate retrieval services / frequency dissemination services / /

Organization

National Security Agency / National Science Foundation / MIT / David L. Mills University of Delaware Newark / University of Delaware / United States Army / National Bureau of Standards / United States Navy / /

Person

Steven Kent / /

Position

author / Private / /

Product

C-0046 / RFC-1305 / /

ProvinceOrState

Delaware / /

Technology

Alpha / designated protocol / Information Technology / MD5 algorithm / private key / secret key / D.L. Improved algorithms / UDP / message-digest algorithm / key management protocol / encryption / cryptography / public key / INTRODUCTION The Network Time Protocol / Photuris session key management protocol / digital signature / public-private key pair using algorithms / related transport protocols / using the server private key / /

URL

http /

SocialTag