![Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data](https://www.pdfsearch.io/img/a20eb7c7b8d983b5868d86d8828af212.jpg)
| Document Date: 2013-04-29 10:13:46 Open Document File Size: 186,26 KBShare Result on Facebook
City Washington / DC / / Company Schroeder / Needham / High Assurance Computer Systems / IBM / / / Event FDA Phase / / IndustryTerm authenticated communications / cryptographic protocols / trusted certi cate server / examples protocols / sub-protocols / harmless challenge-response protocol / given protocol / cryptographic algorithms / similar protocols / connection protocol / sub-protocol / larger protocol / distinct protocols / early protocols / cryptographic protocol / real-time compromise / problem protocols / reconnection protocol / / Organization Naval Research Laboratory Center for High Assurance Computer Systems Washington / / Person Schroeder / / / Position designer / / Product Charlie / Alice / Bob / / ProgrammingLanguage DC / C / / Technology encryption / key-exchange protocols / cryptography / two sub-protocols / examples protocols / one protocol / larger protocol / symmetric encryption / public key / key exchange protocol / seemingly harmless challenge-response protocol / separately analyzing sub-protocols / cryptographic protocol / similar protocols / STS protocol / 3 Protocol / private key / given protocol / two protocols / same protocol / application protocol / problem protocols / digital signature / SSL / reconnection protocol / connection protocol / public key encryption / e.g. encryption / /
SocialTag |