Back to Results
First PageMeta Content
Information / Man-in-the-middle attack / Alice and Bob / Wide Mouth Frog protocol / Replay attack / Blind signature / Burrows–Abadi–Needham logic / Public-key cryptography / Communications protocol / Cryptography / Cryptographic protocols / Data


Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 151,43 KB

Share Result on Facebook
UPDATE