<--- Back to Details
First PageDocument Content
Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Public-key cryptography / Cryptographic nonce / XTR / Deniable authentication / Security protocol notation / Wide Mouth Frog protocol / Cryptographic protocols / Cryptography / Data
Date: 2013-04-29 11:09:46
Burrows–Abadi–Needham logic
Needham–Schroeder protocol
Public-key cryptography
Cryptographic nonce
XTR
Deniable authentication
Security protocol notation
Wide Mouth Frog protocol
Cryptographic protocols
Cryptography
Data

NRL Release Number[removed]The Logic of Authentication Protocols ?

Add to Reading List

Source URL: www.nrl.navy.mil

Download Document from Source Website

File Size: 492,12 KB

Share Document on Facebook

Similar Documents

Cryptographic protocols / Public-key cryptography / Notary / Online chat / Internet protocols / Deniable authentication / XMPP / Off-the-Record Messaging / Authentication / Digital signature / Key exchange / Transport Layer Security

Improved Group Off-the-Record Messaging Hong Liu Eugene Y. Vasserman Nicholas Hopper

DocID: 1juQC - View Document

POSTER: Deniable Anonymous Group Authentication Ewa Syta Ph.D. Student Yale University Email:

DocID: 1e7g2 - View Document

Burrows–Abadi–Needham logic / Belief revision / Epistemic modal logic / Communications protocol / Deniable authentication / IP / Cryptographic protocols / Data / Information

Belief Change and Cryptographic Protocol Verification Aaron Hunter and James P. Delgrande School of Computing Science Simon Fraser University Burnaby, BC, Canada {amhunter, jim}@cs.sfu.ca

DocID: 15fhp - View Document

Key management / Deniable authentication / Ring signature / Digital signature / Authenticated encryption / Zero-knowledge proof / Proof of knowledge / Cryptography / Cryptographic protocols / Public-key cryptography

Microsoft Word - DA standarden.doc

DocID: 134tk - View Document

Internet privacy / Cryptographic software / Off-the-Record Messaging / Diffie–Hellman key exchange / Key exchange / Man-in-the-middle attack / Deniable authentication / Digital signature / SecureIM / Cryptography / Cryptographic protocols / Public-key cryptography

Off-the-Record Communication, or, Why Not To Use PGP Nikita Borisov UC Berkeley Ian Goldberg

DocID: 12cQ4 - View Document