Back to Results
First PageMeta Content
Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data


NRL Release Number[removed]Environmental Requirements for Authentication Protocols Ran Canetti1 and Catherine Meadows2 and Paul Syverson2 1
Add to Reading List

Document Date: 2013-04-29 10:13:46


Open Document

File Size: 186,26 KB

Share Result on Facebook

City

Washington / DC / /

Company

Schroeder / Needham / High Assurance Computer Systems / IBM / /

/

Event

FDA Phase / /

IndustryTerm

authenticated communications / cryptographic protocols / trusted certi cate server / examples protocols / sub-protocols / harmless challenge-response protocol / given protocol / cryptographic algorithms / similar protocols / connection protocol / sub-protocol / larger protocol / distinct protocols / early protocols / cryptographic protocol / real-time compromise / problem protocols / reconnection protocol / /

Organization

Naval Research Laboratory Center for High Assurance Computer Systems Washington / /

Person

Schroeder / /

/

Position

designer / /

Product

Charlie / Alice / Bob / /

ProgrammingLanguage

DC / C / /

Technology

encryption / key-exchange protocols / cryptography / two sub-protocols / examples protocols / one protocol / larger protocol / symmetric encryption / public key / key exchange protocol / seemingly harmless challenge-response protocol / separately analyzing sub-protocols / cryptographic protocol / similar protocols / STS protocol / 3 Protocol / private key / given protocol / two protocols / same protocol / application protocol / problem protocols / digital signature / SSL / reconnection protocol / connection protocol / public key encryption / e.g. encryption / /

SocialTag