| Document Date: 2006-06-28 12:55:55 Open Document File Size: 181,57 KBShare Result on Facebook
Company The times / Sun / Intel / / Country United States / / Currency AED / / Facility Bouncy Castle / Computer Science University of California / / IndustryTerm wireless channel / participants/devices / security applications / nearby device / secure device / bank account / public key infrastructure / target devices / heterogeneous personal devices / similar devices / text recognition devices / user-attended device / un-attended target device / textbook protocols / exhaustive search / Wireless networks / un-associated devices / point-of-sale device / user-attended personal device / wireless access point / non-cryptographic software initialization / personal devices / public-key-based key exchange protocols / wireless subnet consisting / device / target device / heuristic algorithm / unassociated devices / bank / mobile computing platforms / hash algorithms / electronic devices / wireless device / wireless projector / device equipment / wireless links / pervasive global security infrastructure / wireless router / peer devices / wireless communication / remote device / / NaturalFeature IR channel / Infrared channel / / OperatingSystem Linux / Windows CE / Windows XP / Microsoft Windows / / Organization University of California / Irvine / Ersin Uzun Department / / Person Michael Sirivianos / Gene Tsudik / John Solis / Michael T. Goodrich / / Position Target Device Display Speaker / speaker / player / Personal Device Display Speaker / assistant / / Product Ewe / HP iPAQ Headphone/Headset / / ProgrammingLanguage Java / C++ / / ProvinceOrState California / / Technology heuristic algorithm / RAM / public key infrastructure / text-to-speech / key exchange protocol / Linux / API / PKI / Station-to-Station protocol / SmartPhone / Diffie-Hellman key exchange protocol / ATM / mobile phones / secret key / mobile devices / RSAbased key exchange protocols / Ethernet / cellular telephone / public key / wireless access / Java / RISC processor / wireless device / smartphones / mobile computing / textbook protocols / MD5 hash algorithms / one wireless router / Bluetooth / public-key-based key exchange protocols / GUI / Diffie-Hellman protocol / / URL www.elantts.com / www.digalo.com / http /
SocialTag |