![Electronic commerce / Cryptographic protocols / SAS / Digital signature / Public key certificate / X.509 / Man-in-the-middle attack / Certificate authority / RSA / Cryptography / Public-key cryptography / Key management Electronic commerce / Cryptographic protocols / SAS / Digital signature / Public key certificate / X.509 / Man-in-the-middle attack / Certificate authority / RSA / Cryptography / Public-key cryptography / Key management](https://www.pdfsearch.io/img/e38f3270bc670b0266c4a6b4e83c7665.jpg)
| Document Date: 2002-02-11 23:20:50 Open Document File Size: 572,34 KBShare Result on Facebook
Company Verisign / Microsoft / / / Facility Computer Science Department University of California / / IndustryTerm hash chain / connected wireless network / signature protocol / on-line nature / portable devices / Internet-style hostname / less computing power / verification protocols / on-line help / web browsers / limited-power devices / victim server / cell telephony / organizational network / chip maker / wireless device / limited-storage devices / non-essential services / electronic commerce transactions / computing / secure applications / user processing times / wireless web access / communication media / database processing / / OperatingSystem DoS / Linux / / Organization University of California / Irvine / / Person Gene Tsudik / Daniele Mazzocchi / Eudora Plug / / Position SEcurity Mediator / arbitrator / administrator / / ProgrammingLanguage TSP / / ProvinceOrState Alice / California / / Technology verification protocols / S/MIME / Ethernet / cellular telephone / cryptography / LAN / 5.2 SAS Signature Protocol / public key / Linux / wireless device / signature protocol / cell phones / private key / SAS signature protocol / digital signature / PDA / Service The SAS signature protocol / /
SocialTag |