Back to Results
First PageMeta Content
Internet privacy / Cryptographic protocols / Communications protocol / Data transmission / Protocols / Public-key cryptography / Proxy server / Anonymity / Application layer / Cryptography / Computing / Data


Microsoft Word - anonim_10
Add to Reading List

Document Date: 2011-12-16 11:44:00


Open Document

File Size: 166,32 KB

Share Result on Facebook

Currency

pence / /

/

Facility

István Vajda Technical University / /

IndustryTerm

wireless media / anonymity protocols / secure protocols / target protocol / automatic tools / cryptographic protocols / wireless applications / anonymity networks / symbolic protocol / wireless communication channel / concrete systems / cryptographic systems / public key infrastructure / wireless application / e.g. wireless / wireless systems / active wireless sender / wireless example / communication protocol / compound protocol / Honest protocols / anonymizer network / on-line/off-line periods / proof technology / real and ideal systems / /

Organization

Technical University of Budapest / /

Position

model for anonymous communication / researcher / scheduler / Private / /

ProvinceOrState

Arkansas / /

Technology

encryption / cryptography / public key infrastructure / user machine H. Protocol / surrounding protocols / artificial intelligence / proof technology / component protocol / real protocol / PKI / compound protocol / MAC address / communication protocol / target protocol / HTTP / UC-secure cooperating protocol / Private Authentication protocol / simulation / anonymity protocols / symbolic protocol / /

SocialTag