Back to Results
First PageMeta Content
Information / Man-in-the-middle attack / Alice and Bob / Wide Mouth Frog protocol / Replay attack / Blind signature / Burrows–Abadi–Needham logic / Public-key cryptography / Communications protocol / Cryptography / Cryptographic protocols / Data


Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 151,43 KB

Share Result on Facebook

City

Minneapolis / /

Company

VeriSign / Digital Equipment Corporation / Protocol Attack John Kelsey Bruce Schneier Counterpane Systems / Entrust Technologies / /

/

Event

FDA Phase / /

IndustryTerm

lower-security product / hardware/software / secure server / inappropriate web pages / lower security protocols / higher-security product / non-cryptographic applications / lower-security protocols / cryptographic protocols / pay-per-view web page / bank / home-banking product / lower-security products / chosen protocols / chosen protocol / fail-stop protocols / pay-per-view web pages / security protocols / /

Organization

M0 / Distributed Authentication Security Service / /

Person

Ross Anderson / Trent / Bob / Alice / Mallory / David Wagner / /

/

Position

Private / /

Product

R0 / AK97 / And95 / BAN90 / GS96 / Sch96 / R1 / TAP90 / M1 / /

ProvinceOrState

Minnesota / /

Technology

high-security protocols / S/MIME / 5 5 Constructing Chosen Protocols / lower-security protocols / ATM / smart card / private key / fail-stop protocols / secret key / SSL / lower security protocols / encryption / cryptography / public key / three chosen protocols / /

SocialTag